Show more

How much Time and Power are consumed by on a secure device...

"Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device"
dl.acm.org/doi/pdf/10.1145/336

Sharing Geolocation Securely over networks via Proof-of-Location ...

"Quantifying location privacy in permissioned blockchain-based internet of things (IoT)"
dl.acm.org/doi/pdf/10.1145/336

Managing faulty sensors and data tampering in Smart Cities...

"Assessing Reliability of Big Data Stream for Smart City"
dl.acm.org/doi/abs/10.1145/337

Transmitting Geolocation securely over peer-to-peer sensor networks... For tracking endangered animals...

"A Routing Protocol for Source Location Privacy in Wireless Sensor Networks with Multiple Sources"
dl.acm.org/doi/pdf/10.1145/334

Logging Rainfall with network and boards...

"Rainfall Intensity Datalogger System. LoPy4-Based Design and Implementation"
dl.acm.org/doi/pdf/10.1145/334

Detecting empty Parking Lots with Computer Vision for Smart Cities ...

"Smart IoT Notification System for Efficient In-City Parking"
dl.acm.org/doi/pdf/10.1145/334

Range of networks in river forests...

"Evaluation of LoRaWAN Transmission Range for Wireless Sensor Networks in Riparian Forests"
dl.acm.org/doi/pdf/10.1145/334

Energy Harvesting devices need device drivers that are fully aware of power consumption...

"Energy-aware device drivers for embedded operating systems"
dl.acm.org/doi/pdf/10.1145/337

Clustering for ... To reduce the CPU and comms on IoT devices...

"Mitigating Messaging and Processing Load in IoT Environments Managed by Blockchain"
dl.acm.org/doi/pdf/10.1145/336

What's next for Gateways...

"Gateways to Heaven: Observations and Predictions on the Software Architecture of IoT Gateways"
dl.acm.org/doi/pdf/10.1145/336

Attacking Industrial networks via ...

"If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic"
dl.acm.org/doi/pdf/10.1145/337

Underwater low-power sensor networks with positioning... Based on cheap Acoustic Modems...

"ahoi: Inexpensive, Low-power Communication and Localization for Underwater Sensor Networks and μAUVs"
dl.acm.org/doi/pdf/10.1145/337

for Marine Surveillance by drones...

"BUMAR: A Blockchain-Empowered UAV-Assisted Smart Surveillance Architecture for Marine Areas"
dl.acm.org/doi/pdf/10.1145/337

Trusted Home with , and ...

"Design and Development of Smart Home Sensing Supported by Blockchain Technology"
dl.acm.org/doi/pdf/10.1145/337

Video Surveillance based on BC-20...

"Research on Intelligent Video Surveillance System in Remote Area Based on NB-IoT"
dl.acm.org/doi/pdf/10.1145/337

Adapting programs to run on devices with intermittent power sources (like energy harvesting)...

"Time-sensitive Intermittent Computing Meets Legacy Software"
dl.acm.org/doi/pdf/10.1145/337

Limitations in sensing human activity with ... And using Image Sensors instead...

"Are Accelerometers for Activity Recognition a Dead-end?"
dl.acm.org/doi/pdf/10.1145/337

Drones can sense oncoming projectiles via Doppler Effect...

"Enabling Self-defense in Small Drones"
dl.acm.org/doi/pdf/10.1145/337

Show more
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.