Show newer

Transmitting Power thru the Body for Wearable sensors...

"SkinnyPower: enabling batteryless wearable sensors via intra-body power transfer"
dl.acm.org/doi/pdf/10.1145/335

Handling Async Tasks on Energy Harvesting devices...

"Intermittent asynchronous peripheral operations"
dl.acm.org/doi/pdf/10.1145/335

Deep Neural Networks for Energy Harvesting devices... Like bicycle helmets...

"Neuro.ZERO: a zero-energy neural network accelerator for embedded sensing and inference systems"
dl.acm.org/doi/pdf/10.1145/335

Sensing various Materials with Tags...

"Tagtag: material sensing with commodity RFID"
dl.acm.org/doi/pdf/10.1145/335

Increase throughput by 3 times... By decoding frame collisions...

"FTrack: parallel decoding for LoRa transmissions"
dl.acm.org/doi/pdf/10.1145/335

Works like Tag... But uses Printed Magnetic Nanoparticles... Cheap and eco-friendly...

"FerroTag: a paper-based mmWave-scannable tagging infrastructure"
dl.acm.org/doi/pdf/10.1145/335

"Paradox of Classis Insecta claims that the ecosystem is analogous to the Classis Insecta, which has about 5 million species. While, PC and mobile Web is analogous to the Classis Mammalia, which only has 5 thousand of species"...

"Zone of control: the basic computing unit for web of everything"
dl.acm.org/doi/pdf/10.1145/331

Transmitting data with sound...

"Extending IoT connectivity of embedded devices with M2M high-speed acoustic data transmission"
dl.acm.org/doi/pdf/10.1145/336

Pluggable Firmware modules for securing devices...

"PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices"
dl.acm.org/doi/pdf/10.1145/333

Automated Fuzz Testing of Linux Firmware through ...

"FirmFuzz: Automated IoT Firmware Introspection and Analysis"
dl.acm.org/doi/pdf/10.1145/333

Prevent spoofing of Actuation Commands with Arm on ...

"Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks"
dl.acm.org/doi/pdf/10.1145/333

Detecting Parking Violations with Phone Cameras mounted on taxis for Smart Cities ...

"City Scale Monitoring of On-Street Parking Violations with StreetHAWK"
dl.acm.org/doi/pdf/10.1145/336

How much Time and Power are consumed by on a secure device...

"Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device"
dl.acm.org/doi/pdf/10.1145/336

Sharing Geolocation Securely over networks via Proof-of-Location ...

"Quantifying location privacy in permissioned blockchain-based internet of things (IoT)"
dl.acm.org/doi/pdf/10.1145/336

Managing faulty sensors and data tampering in Smart Cities...

"Assessing Reliability of Big Data Stream for Smart City"
dl.acm.org/doi/abs/10.1145/337

Transmitting Geolocation securely over peer-to-peer sensor networks... For tracking endangered animals...

"A Routing Protocol for Source Location Privacy in Wireless Sensor Networks with Multiple Sources"
dl.acm.org/doi/pdf/10.1145/334

Logging Rainfall with network and boards...

"Rainfall Intensity Datalogger System. LoPy4-Based Design and Implementation"
dl.acm.org/doi/pdf/10.1145/334

Detecting empty Parking Lots with Computer Vision for Smart Cities ...

"Smart IoT Notification System for Efficient In-City Parking"
dl.acm.org/doi/pdf/10.1145/334

Range of networks in river forests...

"Evaluation of LoRaWAN Transmission Range for Wireless Sensor Networks in Riparian Forests"
dl.acm.org/doi/pdf/10.1145/334

Energy Harvesting devices need device drivers that are fully aware of power consumption...

"Energy-aware device drivers for embedded operating systems"
dl.acm.org/doi/pdf/10.1145/337

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.