Sciweavers

SUTC
2008
IEEE
14 years 5 months ago
Using Body Sensor Networks for Increased Safety in Bomb Disposal Missions
Bomb disposal manned missions are inherently safetycritical. Wireless Sensor Network (WSN) technology potentially offers an opportunity to increase the safety of the operatives in...
John Kemp, Elena I. Gaura, James Brusey, C. Dougla...
SUTC
2008
IEEE
14 years 5 months ago
Two-Way Beacon Scheduling in ZigBee Tree-Based Wireless Sensor Networks
Broadcast and convergecast are two fundamental operations in wireless sensor networks. Although previous works have addressed energy-efficient and low-latency scheduling, these w...
Lun-Wu Yeh, Meng-Shiuan Pan, Yu-Chee Tseng
SUTC
2008
IEEE
14 years 5 months ago
Effective Feature Space Reduction with Imbalanced Data for Semantic Concept Detection
Semantic understanding of multimedia content has become a very popular research topic in recent years. Semantic concept detection algorithms face many challenges such as the seman...
Lin Lin, Guy Ravitz, Mei-Ling Shyu, Shu-Ching Chen
SUTC
2008
IEEE
14 years 5 months ago
Two Practical Considerations of Beacon Deployment for Ultrasound-Based Indoor Localization Systems
In this paper, two practical considerations of beacon deployment for ultrasound-based indoor localization systems are presented. In an indoor environment, beacons are deployed inc...
Chun-Chieh Hsiao, Polly Huang
SUTC
2008
IEEE
14 years 5 months ago
Power-Aware Real-Time Scheduling upon Identical Multiprocessor Platforms
In this paper, we address the power-aware scheduling of sporadic constrained-deadline hard real-time tasks using dynamic voltage scaling upon multiprocessor platforms. We propose ...
Vincent Nélis, Joël Goossens, Raymond ...
SUTC
2008
IEEE
14 years 5 months ago
Service-Oriented Design Methodology for Wireless Sensor Networks: A View through Case Studies
— In this paper we discuss the design methodology based on the service-oriented architecture and agile development principles for wireless embedded and sensor networks (WSNs). Th...
Elena Meshkova, Janne Riihijärvi, Frank Oldew...
SUTC
2008
IEEE
14 years 5 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
SUTC
2008
IEEE
14 years 5 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
SUTC
2008
IEEE
14 years 5 months ago
EvAnT: Analysis and Checking of Event Traces for Wireless Sensor Networks
Testing and verification methodologies for Wireless Sensor Networks (WSN) systems in pre-deployment are vital for a successful deployment. Increased visibility of the internal st...
Matthias Woehrle, Christian Plessl, Roman Lim, Jan...