Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: A Survey
Smart wearables collect and analyze data, and in some scenarios make a smart decision
and provide a response to the user and are finding more and more applications in our daily …
and provide a response to the user and are finding more and more applications in our daily …
Location of Things (LoT): A review and taxonomy of sensors localization in IoT infrastructure
Internet of Things (IoT) is a novel design paradigm, intended as a network of billions to
trillions of tiny sensors communicating with each other to offer innovative solutions to real …
trillions of tiny sensors communicating with each other to offer innovative solutions to real …
Ranging with ultrawide bandwidth signals in multipath environments
Over the coming decades, high-definition situationally-aware networks have the potential to
create revolutionary applications in the social, scientific, commercial, and military sectors …
create revolutionary applications in the social, scientific, commercial, and military sectors …
Localization algorithms of wireless sensor networks: a survey
Abstract In Wireless Sensor Networks (WSNs), localization is one of the most important
technologies since it plays a critical role in many applications, eg, target tracking. If the users …
technologies since it plays a critical role in many applications, eg, target tracking. If the users …
A secure localization scheme based on trust assessment for WSNs using blockchain technology
Abstract Wireless Sensor Network (WSN) is one of the integral part of the present ubiquitous
and pervasive computing. The smartness of the applications is incomplete without WSNs …
and pervasive computing. The smartness of the applications is incomplete without WSNs …
Missing the memory wall: The case for processor/memory integration
A Saulsbury, F Pong, A Nowatzyk - ACM SIGARCH Computer …, 1996 - dl.acm.org
Current high performance computer systems use complex, large superscalar CPUs that
interface to the main memory through a hierarchy of caches and interconnect systems …
interface to the main memory through a hierarchy of caches and interconnect systems …
[BUKU][B] Security for wireless ad hoc networks
F Anjum, P Mouchtaris - 2007 - books.google.com
This book addresses the problems and brings solutions to the security issues of ad-hoc
networks. Topics included are threat attacks and vulnerabilities, basic cryptography …
networks. Topics included are threat attacks and vulnerabilities, basic cryptography …
ZIL: An energy-efficient indoor localization system using ZigBee radio to detect WiFi fingerprints
In existing WiFi-based localization methods, smart mobile devices consume quite a lot of
power as WiFi interfaces need to be used for frequent AP scanning during the localization …
power as WiFi interfaces need to be used for frequent AP scanning during the localization …
Secure localization algorithms for wireless sensor networks
A Boukerche, HABF Oliveira… - IEEE …, 2008 - ieeexplore.ieee.org
In the military and emergency preparedness class of applications, wireless sensor networks
have a number of desirable characteristics, such as being autonomous systems that can be …
have a number of desirable characteristics, such as being autonomous systems that can be …
Path planning using a mobile anchor node based on trilateration in wireless sensor networks
In wireless sensor networks (WSNs), many applications require sensor nodes to obtain their
locations. Now, the main idea in most existing localization algorithms has been that a mobile …
locations. Now, the main idea in most existing localization algorithms has been that a mobile …