Sciweavers

PERCOM
2006
ACM
15 years 2 days ago
Analysing fundamental properties of marker-based vision system designs
This paper investigates fundamental properties of Marker-based Vision (MBV) systems. We present a theoretical analysis of the performance of basic tag designs which is extended th...
Andrew C. Rice, Robert K. Harle, Alastair R. Beres...
PERCOM
2006
ACM
15 years 2 days ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
PERCOM
2006
ACM
15 years 2 days ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
PERCOM
2006
ACM
15 years 2 days ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
PERCOM
2006
ACM
15 years 2 days ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste
PERCOM
2007
ACM
15 years 2 days ago
Facilitating RFID Development with the Accada Prototyping Platform
The proliferation of radiofrequency identification systems in application domains such as supply chain management requires an IT infrastructure that provides RFID device and data ...
Christian Floerkemeier, Matthias Lampe, Christof R...
PERCOM
2007
ACM
15 years 2 days ago
Pervasive Fabrication: Making Construction Ubiquitous in Education
The notion of "pervasive computing" has traditionally been identified with a focus on what might be called "pervasive processing". This paper, in contrast, argu...
Michael Eisenberg
PERCOM
2007
ACM
15 years 2 days ago
Exploring Non Uniform Quality of Service for Extending WSN Lifetime
Interest in extracting and exploiting information from wireless sensor networks has been increasing for several years. Most scenarios focus on collecting and evaluating large amoun...
Anna Egorova-Forster, Amy L. Murphy