User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
The scope of wireless sensor network (WSN) applications has traditionally been restricted by physical sensor coverage and limited computational power. Meanwhile, IP networks like t...
This paper describes a system that is robust with respect to sensor failure. The system utilizes multiple sensor inputs (three in this case) connected to a programmable device (FP...
Abstract. We consider the self-deployment problem in a ring for a network of identical sensors: starting from some initial random placement in the ring, the sensors in the network ...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro
Abstract. Due to their small form factor and modest energy budget, individual sensors are not expected to be GPS-enabled. Moreover, in most applications, exact geographic location ...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
The increasing use of distributed authentication architecture has made interoperability of systems an important issue. Interoperability of systems reflects the maturity of the tech...
In smart item environments, multitude of sensors are applied to capture data about product conditions and usage to guide business decisions as well as production automation proces...
Anja Klein, Hong Hai Do, Gregor Hackenbroich, Marc...
Wireless sensor networks have been widely used in many surveillance applications. Due to the importance of sensor nodes in such applications, certain level of protection needs to b...
The exposure of a path p is a measure of the likelihood that an object traveling along p is detected by a network of sensors and it is formally defined as an integral over all poin...
This paper provides an overview of our selection process for proximity sensors for manipulator collision avoidance. Five categories of sensors have been considered for this use in...