A distributed system for answering range queries on sensor network data (English)
- New search for: Cuzzocrea, A.
- New search for: Furfaro, F.
- New search for: Greco, S.
- New search for: Masciari, E.
- New search for: Mazzeo, G.M.
- New search for: Sacca, D.
- New search for: Cuzzocrea, A.
- New search for: Furfaro, F.
- New search for: Greco, S.
- New search for: Masciari, E.
- New search for: Mazzeo, G.M.
- New search for: Sacca, D.
In:
Third IEEE International Conference on Pervasive Computing and Communications Workshops
;
369-373
;
2005
-
ISBN:
- Conference paper / Electronic Resource
-
Title:A distributed system for answering range queries on sensor network data
-
Contributors:Cuzzocrea, A. ( author ) / Furfaro, F. ( author ) / Greco, S. ( author ) / Masciari, E. ( author ) / Mazzeo, G.M. ( author ) / Sacca, D. ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2005-01-01
-
Size:319680 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Hybrid context model based on multilevel situation theory and ontology for contact centersKalyan, A. / Gopalan, S. / Sridhar, V. et al. | 2005
- 8
-
A metamodel approach to context informationFuchs, F. / Hochstatter, I. / Krause, M. et al. | 2005
- 15
-
RDF-based model for context-aware reasoning in rich service environmentForstadius, J. / Lassila, O. / Seppanen, T. et al. | 2005
- 20
-
Extending context models for privacy in pervasive computing environmentsHenricksen, K. / Wishart, R. / McFadden, T. / Indulska, J. et al. | 2005
- 25
-
Benefits of Integrating Meta Data into a Context ModelHonle, N. / Kappeler, U.-P. / Nicklas, D. / Schwarz, T. / Grossmann, M. et al. | 2005
- 30
-
Towards integrated design of context-sensitive interactive systemsVan den Bergh, J. / Coninx, K. et al. | 2005
- 35
-
Automatic development of an abstract context model for an intelligent environmentBrdiczka, O. / Reignier, P. / Crowley, J.L. et al. | 2005
- 43
-
Mapping of file-sharing onto mobile environments: enhancement by UMTSHofeld, T. / Tutschku, K. / Andersen, F.-U. et al. | 2005
- 50
-
Energy efficient data retrieval and caching in mobile peer-to-peer networksJoseph, M.S. / Kumar, M. / Huaping Shen, / Das, S. et al. | 2005
- 55
-
A lightweight service discovery mechanism for mobile ad hoc pervasive environment using cross-layer designLi Li, / Lamont, L. et al. | 2005
- 60
-
From Pastry to CrossROAD: CROSS-layer ring overlay for ad hoc networksDelmastro, F. et al. | 2005
- 65
-
Enabling reliable many-to-many communication in ad-hoc pervasive environmentsVollset, E. / Ezhilchelvan, P. et al. | 2005
- 70
-
Every node is born equal: attacking preferential attachment in peer-to-peer mobile multihop networksChansu Yu, / Seung-Min Park, / Heung-Nam Kim, et al. | 2005
- 75
-
Pervasive communication for commuters in public busesTeck Meng Lim, / Boon Chong Seet, / Bu Sung Lee, / Chai Kiat Yeo, / Kassler, A. et al. | 2005
- 80
-
A mobile system of super-peers using city busesBoon-Chong Seet, / Chiew-Tong Lau, / Wen-Jing Hsu, / Bu-Sung Lee, et al. | 2005
- 86
-
Mobile Chedar - a peer-to-peer middleware for mobile devicesKotilainen, N. / Weber, M. / Vapa, M. / Vuori, J. et al. | 2005
- 91
-
Determination of time and order for event-based middleware in mobile peer-to-peer environmentsYoneki, E. / Bacon, J. et al. | 2005
- 97
-
Applying active space principles to active classroomsPeiper, C. / Warden, D. / Chan, E. / Campbell, R. / Kamin, S. / Wentling, T. et al. | 2005
- 105
-
Security parallels between people and pervasive devicesWeis, S.A. et al. | 2005
- 110
-
A scalable and provably secure hash-based RFID protocolAvoine, G. / Oechslin, P. et al. | 2005
- 115
-
Toward unlinkable ID management for multi-service environmentsNohara, Y. / Inoue, S. / Yasuura, H. et al. | 2005
- 120
-
A learning model for trustworthiness of context-awareness servicesHuebscher, M.C. / McCann, J.A. et al. | 2005
- 125
-
A privacy enhanced service architecture for mobile usersBessler, S. / Jorns, O. et al. | 2005
- 130
-
Privacy and anonymity in personal networksJacobsson, M. / Niemegeers, I. et al. | 2005
- 136
-
A capability-based privacy-preserving scheme for pervasive computing environmentsKonidala, D.M. / Duc, D.N. / Dongman Lee, / Kwangjo Kim, et al. | 2005
- 141
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devicesNash, D.C. / Martin, T.L. / Ha, D.S. / Hsiao, M.S. et al. | 2005
- 146
-
State of the art in ultra-low power public key cryptography for wireless sensor networksGaubatz, G. / Kaps, J.-P. / Ozturk, E. / Sunar, B. et al. | 2005
- 153
-
DocWeb: a storage abstraction for wireless devicesSrinivasan, S.H. et al. | 2005
- 158
-
REDMAN: a decentralized middleware solution for cooperative replication in dense MANETsBellavista, P. / Corradi, A. / Magistretti, E. et al. | 2005
- 163
-
A thin storage architecture for wirelessSrinivasan, S.H. et al. | 2005
- 168
-
Experiences with MundoCoreAitenbichler, E. / Kangasharju, J. / Muhlhauser, M. et al. | 2005
- 173
-
Communication context for adaptive mobile applicationsPeddemors, A. / Eertink, H. / Niemegeers, I. et al. | 2005
- 178
-
PDP and GSDL: a new service discovery middleware to support spontaneous interactions in pervasive systemsCampo, C. / Munoz, M. / Perea, J.C. / Mann, A. / Garcia-Rubio, C. et al. | 2005
- 183
-
Middleware for user controlled environmentsKeller, B. / Owen, T. / Wakeman, I. / Weeds, J. / Weir, D. et al. | 2005
- 189
-
Design and implementation of "kubit" for sensing and control ubiquitous applicationsYoshihara, K. / Motegi, S. / Horiuchi, H. et al. | 2005
- 194
-
Towards a pervasive computing benchmarkRanganathan, A. / Al-Muhtadi, J. / Biehl, J. / Ziebart, B. / Campbell, R.H. / Bailey, B. et al. | 2005
- 199
-
Security architecture for service-based mobile environmentsKopp, H. / Lucke, U. / Tavangarian, D. et al. | 2005
- 204
-
Media distribution in a pervasive computing environmentBerkvens, W.A.H. / Claassen, A. / van Gassel, J.P. / Sinitsyn, A. et al. | 2005
- 209
-
Cascading policies provide fault tolerance for pervasive clinical communicationsWilliams, R. / Srikant Jalan, / Stern, E. / Lussier, Y.A. et al. | 2005
- 215
-
The analysis of the optimal contention period for broadband wireless access networkSung-Min Oh, / Jae-Hyun Kim, et al. | 2005
- 220
-
Trading latency for energy in wireless ad hoc networks using message ferryingHyewon Jun, / Wenrui Zhao, / Ammar, M.H. / Zegura, E.W. / Chungki Lee, et al. | 2005
- 226
-
A biologically inspired congestion control routing algorithm for MANETsZhenyu Liu, / Kwiatkowska, M.Z. / Constantinou, C. et al. | 2005
- 232
-
Experimental evaluation of ad hoc routing protocolsBorgia, E. et al. | 2005
- 237
-
Shortcut detection and route repair in ad hoc networksZapata, M.G. et al. | 2005
- 243
-
Tunecast - administratively scoped broadcast received by tuned receiversYangWoo Ko, / Dongman Lee, / Kyungran Kang, et al. | 2005
- 248
-
Label switched multi-path forwarding in wireless ad-hoc networksHang Liu, / Raychaudhuri, D. et al. | 2005
- 253
-
D2HT: directory federation using DHT to support open scalability in ubiquitous networkChoi, K.H. / Shin, H.J. / Shin, D.R. et al. | 2005
- 258
-
Routing layer support for service discovery in mobile ad hoc networksVerveridis, C.N. / Polyzos, G.C. et al. | 2005
- 263
-
Adaptive location management scheme for mobile IPHa Won Kim, / Sung Je Hong, / Jong Kim, et al. | 2005
- 268
-
The area graph-based mobility model and its impact on data disseminationBittner, S. / Raffel, W.-U. / Scholz, M. et al. | 2005
- 273
-
Bayesian based location estimation system using wireless LANIto, S. / Kawaguchi, N. et al. | 2005
- 279
-
Link layer security for SAHN protocolsMuhammad Mahmudul Islam, / Pose, R. / Kopp, C. et al. | 2005
- 284
-
Security analysis of two anonymous authentication protocols for distributed wireless networksWong, D.S. et al. | 2005
- 291
-
3D worlds for edutainment: educational, relational and organizational principlesDi Blas, N. / Paolini, P. / Poggi, C. et al. | 2005
- 296
-
Interactive pathway design for learning through agent and library augmented shared knowledge areas (ALASKA)Hamilton, E. / DiGiano, C. / Cole, R. / Ward, W. / LaBine, D. et al. | 2005
- 302
-
Extending LCMS for remote accessible field trips in RAFTSpecht, M. / Kaibel, A. / Apelt, S. et al. | 2005
- 307
-
Mobile phones as a challenge for m-learning: examples for mobile interactive learning objects (MILOs)Holzinger, A. / Nischelwitzer, A. / Meisenberger, M. et al. | 2005
- 312
-
Securing wireless networks in a university environmentEisinger, J. / Winterer, P. / Becker, B. et al. | 2005
- 317
-
CanCore: best practices for learning object metadata in ubiquitous computing environmentsFriesen, N. / McGreal, R. et al. | 2005
- 322
-
Re-conceptualizing learning environments: a framework for pervasive elearningKeil-Slawik, R. / Hampel, T. / Essmann, B. et al. | 2005
- 327
-
Hoarding content in m-learning contextTrifonova, A. / Ronchetti, M. et al. | 2005
- 332
-
Pervasive, persuasive elearning: modeling the pervasive learning spaceThomas, S. et al. | 2005
- 337
-
Modeling context-aware e-learning scenariosDerntl, M. / Hummel, K.A. et al. | 2005
- 345
-
Cooperative packet forwarding in multi-domain sensor networksFelegyhazi, M. / Hubaux, J.-P. / Buttyan, L. et al. | 2005
- 350
-
When does opportunistic routing make sense?Shah, R.C. / Wietholter, S. / Wolisz, A. / Rabaey, J.M. et al. | 2005
- 357
-
Evaluating routing-related energy expenditure in sensor networksOlariu, S. / Qingwen Xu, / Stojmenovic, I. et al. | 2005
- 362
-
Supporting topographic queries in a class of networked sensor systemsSingh, M. / Prasanna, V.K. et al. | 2005
- 369
-
A distributed system for answering range queries on sensor network dataCuzzocrea, A. / Furfaro, F. / Greco, S. / Masciari, E. / Mazzeo, G.M. / Sacca, D. et al. | 2005
- 374
-
Sensor data collection with expected reliability guaranteesQi Han, / Lazaridis, I. / Sharad Mehrotra, / Nalini Venkatasubramanian, et al. | 2005
- 379
-
Autonomous localization method in wireless sensor networksOhta, Y. / Sugano, M. / Murata, M. et al. | 2005
- 385
-
A framework for intelligent sensor network with video camera for structural health monitoring of bridgesBasharat, A. / Catbas, N. / Shah, M. et al. | 2005
- 390
-
MASTAQ: a middleware architecture for sensor applications with statistical quality constraintsInseok Hwang, / Qi Han, / Misra, A. et al. | 2005
- 396
-
Sentire: a framework for building middleware for sensor and actuator networksBranch, J.W. / Davis, J.S. / Sow, D.M. / Chatschik Bisdikian, et al. | 2005
- 401
-
A context-aware approach to conserving energy in wireless sensor networksSuan Khai Chong, / Shonali Krishnaswamy, / Seng Wai Loke, et al. | 2005
- 406
-
Energy efficient differentiable coverage service protocols for wireless sensor networksOzgur Sanli, H. / Hasan Cam, et al. | 2005
- 411
-
Maneuverable relays to improve energy efficiency in sensor networksEidenbenz, S. / Kroc, L. / Smith, J.P. et al. | 2005
- 419
-
Author index| 2005
- c1
-
Third IEEE International Conference on Pervasive Computing and Communications Workshops - Cover| 2005
- i
-
Third IEEE International Conference on Pervasive Computing and Communications Workshops - Title Page| 2005
- iv
-
Third IEEE International Conference on Pervasive Computing and Communications Workshops - Copyright Page| 2005
- v
-
Third IEEE International Conference on Pervasive Computing and Communications Workshops - Table of Contents| 2005
- xi
-
Message from the General Chairs| 2005
- xii
-
Message from the Workshops Chairs| 2005
- xiii
-
Message from the Workshop Chair| 2005
- xiv
-
Workshop Organization| 2005
- xix
-
Message from Workshop Co-Chairs| 2005
- xv
-
Message from the Technical Program Chairs| 2005
- xvii
-
Message from the Workshop Co-Chairs| 2005