Sciweavers

SUTC
2006
IEEE
14 years 6 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
SUTC
2006
IEEE
14 years 6 months ago
Deploying a Sensor Network in an Extreme Environment
A wireless sensor network has been designed and deployed to gather data from nodes deployed inside glaciers. This paper describes the solutions to power management, radio communic...
Kirk Martinez, Paritosh Padhy, Ahmed Elsaify, Gang...
SUTC
2006
IEEE
14 years 6 months ago
Design and Implementation of Ubiquitous Smart Cameras
Design aspects and software modelling for ubiquitous real-time camera system are described in this paper. We propose system architecture using a network of inexpensive cameras and...
Chang Hong Lin, Wayne Wolf, Andrew Dixon, Xenofon ...
SUTC
2006
IEEE
14 years 6 months ago
A new bi-processor SmartPhone
Valeria Loscrì, Salvatore Marano
SUTC
2006
IEEE
14 years 6 months ago
Transitive Nearest Neighbor Search in Mobile Environments
Given a query point p, typically the position of a current client, and two datasets S and R, a transitive nearest neighbor (TNN) search returns a pair of objects (s, r) ∈ S × R...
Baihua Zheng, Ken C. K. Lee, Wang-Chien Lee
SUTC
2006
IEEE
14 years 6 months ago
Schedules with Minimized Access Latency for Disseminating Dependent Information on Multiple Channels
In wireless mobile environments, data broadcasting is an effective approach to disseminate information to mobile clients. In some applications, the access pattern of all the data...
Kun-Feng Lin, Chuan-Ming Liu
SUTC
2006
IEEE
14 years 6 months ago
An Efficient Soft-Input Scaling Scheme for Turbo Decoding
Yi-Nan Lin, Wei-Wen Hung, Wei-Chen Lin, Tsan-Jieh ...
SUTC
2006
IEEE
14 years 6 months ago
Sensor Networks for Everyday Use: The BL-Live Experience
With 250,000 NTD invested, 6 man power allocated, and 9 month time elapsed, we present BLLive. The seemingly dumb, senseless BL Hall at National Taiwan University is transformed t...
Seng-Yong Lau, Ting-Hao Chang, Shu-Yu Hu, Hsing-Ju...
SUTC
2006
IEEE
14 years 6 months ago
DTTC: Delay-Tolerant Trajectory Compression for Object Tracking Sensor Networks
Taking advantage of the delay tolerance for objects tracking sensor networks, we propose delay-tolerant trajectory compression (DTTC) technique, an efficient and accurate algorit...
Yingqi Xu, Wang-Chien Lee
SUTC
2006
IEEE
14 years 6 months ago
Power-aware Node Deployment in Wireless Sensor Networks
Sensor networks have attracted intensive interests due to its extendable capability. In this paper, we attempt to answer a fundamental but practical question:” how should we dep...
Yunhuai Liu, Hoilun Ngan, Lionel M. Ni