Sciweavers

PERCOM
2005
ACM
15 years 2 days ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
PERCOM
2005
ACM
15 years 2 days ago
MASTAQ: A Middleware Architecture for Sensor Applications with Statistical Quality Constraints
We present the design goals and functional components of MASTAQ, a data management middleware for pervasive applications that utilize sensor data. MASTAQ allows applications to sp...
Inseok Hwang, Qi Han, Archan Misra
PERCOM
2005
ACM
15 years 2 days ago
Extending Context Models for Privacy in Pervasive Computing Environments
Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas...
Karen Henricksen, Ryan Wishart, Ted McFadden, Jadw...
PERCOM
2005
ACM
15 years 2 days ago
Sensor Data Collection with Expected Reliability Guarantees
Due to the fragility of small sensors, their finite energy supply and the loss of packets in the wireless channel, reports from sensors may not reach the sink node. In this paper ...
Qi Han, Iosif Lazaridis, Sharad Mehrotra, Nalini V...
PERCOM
2005
ACM
15 years 2 days ago
Mobile Chedar - A Peer-to-Peer Middleware for Mobile Devices
This paper presents the Mobile Chedar Peer-to-Peer middleware for mobile peer-to-peer applications. The middleware is an extension to the Chedar peer-to-peer network allowing mobi...
Niko Kotilainen, Matthieu Weber, Mikko Vapa, Juori...
PERCOM
2005
ACM
15 years 2 days ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
PERCOM
2005
ACM
15 years 2 days ago
Adaptive Location Management Scheme for Mobile IP
Mobile IP is a common standard to support global mobility of mobile hosts (MHs). One of the major problems for the Mobile IP is frequent location update and high signaling overhea...
Ha Won Kim, Sung Je Hong, Jong Kim
PERCOM
2005
ACM
15 years 2 days ago
Middleware for User Controlled Environments
In this paper, we describe the middleware that has evolved from our attempt to capture user descriptions of policies controlling devices and services from natural language. Descri...
Bill Keller, Tim Owen, Ian Wakeman, Julie Weeds, D...
PERCOM
2005
ACM
15 years 2 days ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...
PERCOM
2005
ACM
15 years 2 days ago
Re-Conceptualizing Learning Environments: A Framework for Pervasive eLearning
Pervasive eLearning requires a novel media perspective on learning objects. Instead of viewing handhelds or smart phones as minimized PCs we would like to propose a perspective on...
Reinhard Keil-Slawik, Thorsten Hampel, Bernd E&szl...