Sciweavers

PERCOM
2007
ACM
14 years 10 months ago
Data Quality and Query Cost in Wireless Sensor Networks
This research is motivated by emerging, real-world wireless sensor network applications for monitoring and control. We examine the benefits and costs of caching data for such appli...
David J. Yates, Erich M. Nahum, Jim Kurose, Prasha...
PERCOM
2007
ACM
14 years 10 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
PERCOM
2007
ACM
14 years 10 months ago
Unlinkability and Real World Constraints in RFID Systems
Unlinkability, the property that prevents an adversary recognizing whether outputs are from the same user, is an important concept in RFID. There are many proposed schemes that pr...
Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura
PERCOM
2007
ACM
14 years 10 months ago
Context-Aware Model in a Ubiquitous Learning Environment
Cassia Pereira Nino, Jader Marques, Débora ...
PERCOM
2007
ACM
14 years 10 months ago
Energy Efficient Routing in Nomadic Networks
We present an evaluation of a novel energy-efficient routing protocol for mobile ad-hoc networks. We combine two techniques for optimizing energy levels with a well-known routing ...
Mads Darø Kristensen, Niels Olof Bouvin
PERCOM
2007
ACM
14 years 10 months ago
Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast
As devices become more reliant on battery power, it is essential to design energy efficient protocols. While there is a vast amount of research into power save protocols for unicas...
Matthew J. Miller, Indranil Gupta
PERCOM
2007
ACM
14 years 10 months ago
Static Path Planning for Mobile Beacons to Localize Sensor Networks
In this paper, we study the static path planning problem with wireless sensor network localization as the primary objective. We consider a model in which sensors are assumed to be...
Rui Huang, Gergely V. Záruba
PERCOM
2007
ACM
14 years 10 months ago
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Rene Mayrhofer