Search
Now showing items 1-10 of 11
A Privacy Enhanced Situation-aware Middleware Framework For Ubiquitous Computing Environments
(Computer Science & Engineering, 2010-07-19)
The Ubiquitous Computing paradigm integrates myriads of small, inexpensive, heterogeneous networked devices, including sensors, distributed throughout the environment, with the intent of enabling context awareness in systems ...
Attributes Selection And Package Design To Maximize Visibility Of Objects
(Computer Science & Engineering, 2010-03-03)
In recent years, there has been significant interest in the development of ranking functions and efficient top-k retrieval algorithms to help users in ad-hoc search and retrieval in databases (e.g., buyers searching for ...
Data Analytics Over Hidden Databases
(Computer Science & Engineering, 2010-11-01)
Web based access to databases have become a popular method of datadelivery. A multitude of websites provides access to their proprietary datathrough web forms. In order to view this data, customers use the web forminterface ...
A Framework For Robust Detection And Prevention Of Wide-spread Node Compromise In Wireless Sensor Networks
(Computer Science & Engineering, 2010-07-19)
Wireless sensor networks are known to be vulnerable to a variety ofattacks that could undermine normal sensor network operations. Manyschemes have been developed to defend the wireless sensor networksagainst various attacks. ...
An Integrated Framework For QoS-aware Data Reporting In Wireless Sensor Networks
(Computer Science & Engineering, 2010-07-19)
Wireless sensor networks are being deployed in a wide variety of applications such as environment monitoring, smart buildings, security, machine surveillance system, and so on.The deployment of sensor networks for a specific ...
Information-driven Data Gathering In Wireless Sensor Networks
(Computer Science & Engineering, 2010-11-01)
Since the advance of wireless technology enables the mass production of low-cost, small-sized sensor nodes, sensor nodes can be densely deployed in an area for high tolerance to node failure or to achieve better coverage ...
Combating DoS Attacks In Wireless Networks Using Lightweight Key Mangement Schemes
(Computer Science & Engineering, 2010-11-01)
The unique features of wireless networks lead to many attractive applications in both military and civilian operations. Wireles networking devices usually use batteries as power supply, which requires all the operations ...
Advanced Software Testing Techniques Based On Combinatorial Design
(Computer Science & Engineering, 2010-11-01)
Combinatorial testing refers to a testing strategy that applies the principles of combinatorial design to the domain of software test generation. Given a system with k parameters, combinatorial testing requires all the ...
Event Recognition From Ambient Assistive Living Technologies
(Computer Science & Engineering, 2010-11-01)
As the population ages and technology advances, a need exists for creating ambient intelligent systems to be placed within the home environment. Attitudes towards technology have been changing, and home monitoring is now ...
High Performance Real-time Embedded Systems: Design And Implementation Of Road Surface Analyzer System
(Computer Science & Engineering, 2010-07-19)
Multi-core processors are becoming main components for many embedded systems. Designing such embedded systems is a complex task, since developers must deal with a number of issues such as multi-threading and optimal use ...