-
1
-
-
24944474052
-
Embedded assessment: Overcoming barriers to early detection with pervasive computing
-
H. W. Gellersen, R. Want, and A. Schmidt, Eds. Springer-Verlag
-
M. Morris, S. S. Intille, and J. S. Beaudin, "Embedded assessment: Overcoming barriers to early detection with pervasive computing," in Proc. of PERVASIVE 2005, H. W. Gellersen, R. Want, and A. Schmidt, Eds. Springer-Verlag, 2005, pp. 333-346.
-
(2005)
Proc. of PERVASIVE 2005
, pp. 333-346
-
-
Morris, M.1
Intille, S.S.2
Beaudin, J.S.3
-
2
-
-
0016256799
-
Early detection of silent ischaemic heart disease by 24-hour electrocardiographic monitoring of active subjects
-
S. Stern and D. Tzivoni, "Early detection of silent ischaemic heart disease by 24-hour electrocardiographic monitoring of active subjects," British Heart Journal, vol. 36, pp. 481-486, 1974.
-
(1974)
British Heart Journal
, vol.36
, pp. 481-486
-
-
Stern, S.1
Tzivoni, D.2
-
3
-
-
35549012560
-
SMART: Scalable medical alert response technology
-
R. Fischer, L. Ohno-Machado, D. Curtis, R. Greenes, T. Stair, and J. Guttag, "SMART: Scalable medical alert response technology," in Smart Medical Technologies Summit (SMT), 2004.
-
(2004)
Smart Medical Technologies Summit (SMT)
-
-
Fischer, R.1
Ohno-Machado, L.2
Curtis, D.3
Greenes, R.4
Stair, T.5
Guttag, J.6
-
4
-
-
33645991463
-
-
Harvard University, Tech. Rep. TR-08-05, Apr
-
V. Shnayder, B.-R. Chen, K. Lorincz, T. R. F. Fulford-Jones, and M. Welsh, "Sensor networks for medical care," Harvard University, Tech. Rep. TR-08-05, Apr. 2005.
-
(2005)
Sensor networks for medical care
-
-
Shnayder, V.1
Chen, B.-R.2
Lorincz, K.3
Fulford-Jones, T.R.F.4
Welsh, M.5
-
5
-
-
52949093133
-
An Ultra-Wearable, Wireless, Low Power ECG Monitoring System
-
Nov
-
C. Park, P. H. Chou, Y. Bai, R. Matthews, and A. Hibbs, "An Ultra-Wearable, Wireless, Low Power ECG Monitoring System," Proceedings of IEEE BioCAS, Nov. 2006.
-
(2006)
Proceedings of IEEE BioCAS
-
-
Park, C.1
Chou, P.H.2
Bai, Y.3
Matthews, R.4
Hibbs, A.5
-
6
-
-
45849120977
-
-
University of Virginia, Tech. Rep. CS-2006-01
-
A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, and J. Stankovic, "ALARM-NET: Wireless Sensor Networks for Assisted-Living and Health Monitoring," University of Virginia, Tech. Rep. CS-2006-01, 2006.
-
(2006)
ALARM-NET: Wireless Sensor Networks for Assisted-Living and Health Monitoring
-
-
Wood, A.1
Virone, G.2
Doan, T.3
Cao, Q.4
Selavo, L.5
Wu, Y.6
Fang, L.7
He, Z.8
Lin, S.9
Stankovic, J.10
-
7
-
-
50649083511
-
Wireless medical sensor networks in emergency response: Implementation and pilot results
-
Waltham, MA
-
T. Gao, C. Pesto, L. Selavo, Y Chen, J. Ko, J. Lim, A. Terzis, A. Watt, J. Jeng, B.-R. Chen, K. Lorincz, and M. Welsh, "Wireless medical sensor networks in emergency response: Implementation and pilot results," in Proc. 2008 IEEE Int. Conf. Technologies for Homeland Security, Waltham, MA, 2008.
-
(2008)
Proc. 2008 IEEE Int. Conf. Technologies for Homeland Security
-
-
Gao, T.1
Pesto, C.2
Selavo, L.3
Chen, Y.4
Ko, J.5
Lim, J.6
Terzis, A.7
Watt, A.8
Jeng, J.9
Chen, B.-R.10
Lorincz, K.11
Welsh, M.12
-
8
-
-
59249083518
-
-
Crossbow Technology, MPR/MIB mote hardware users manual, Jan. 2006, http://www.xbow.com/Support/manuals.htm.
-
Crossbow Technology, "MPR/MIB mote hardware users manual," Jan. 2006, http://www.xbow.com/Support/manuals.htm.
-
-
-
-
9
-
-
0008863854
-
-
Office for Civil Rights, Medical Privacy, National Standards to Protect the Privacy of Personal Health Information
-
Office for Civil Rights, United State Department of Health and Human Services, "Medical Privacy - National Standards to Protect the Privacy of Personal Health Information," http://hhs.gov/ocr/hipaa/finalreg.html.
-
United State Department of Health and Human Services
-
-
-
10
-
-
85015580987
-
Security solutions for pervasive healthcare
-
Y Xiao, Ed
-
K. K. Venkatasubramanian and S. K. S. Gupta, "Security solutions for pervasive healthcare," in Security in Distributed, Grid, Mobile, and Pervasive Computing, Y Xiao, Ed., 2007.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
11
-
-
39549095289
-
-
Moteiv Corporation
-
Moteiv Corporation, "Tmote Sky," 2007, http://www.moteiv.com/ products/tmotesky.php.
-
(2007)
Tmote Sky
-
-
-
12
-
-
27244436587
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Aug
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," in Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2004.
-
(2004)
Workshop on Cryptographic Hardware and Embedded Systems
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
16
-
-
14844283547
-
Physio Bank, Physio Toolkit, and Physio Net: Components of a new research resource for complex physiologic signals
-
June 13
-
A. L. Goldberger. L. A. N. Amaral, L. Glass. J. M. Hausdorff, P. C. Ivanov, R. G. Mark, J. E. Mietus, G. B. Moody, C.-K. Peng, and H. E. Stanley, "Physio Bank, Physio Toolkit, and Physio Net: Components of a new research resource for complex physiologic signals," Circulation, vol. 101, no. 23. pp. e215-e220, 2000 (June 13).
-
(2000)
Circulation
, vol.101
, Issue.23
-
-
Goldberger, A.L.1
Amaral, L.A.N.2
Glass, L.3
Hausdorff, J.M.4
Ivanov, P.C.5
Mark, R.G.6
Mietus, J.E.7
Moody, G.B.8
Peng, C.-K.9
Stanley, H.E.10
-
17
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
18
-
-
0000838441
-
Use of elliptic curves in cryptography
-
V. Miller. "Use of elliptic curves in cryptography," in CRYPTO 85, 1985.
-
(1985)
CRYPTO 85
-
-
Miller, V.1
-
24
-
-
59249109406
-
-
H. Wang, B. Sheng, C. C. Tan, and Q. Li, WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes, Dept. of Computer Science. College of William and Mary. Tech. Rep. WM-CS-2007-11, 2007.
-
H. Wang, B. Sheng, C. C. Tan, and Q. Li, "WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes," Dept. of Computer Science. College of William and Mary. Tech. Rep. WM-CS-2007-11, 2007.
-
-
-
-
26
-
-
0003729341
-
-
Feb, RFC 2104
-
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," Feb. 1997, RFC 2104, http://www.ietf.org/rfc/ rfc2104.txt.
-
(1997)
HMAC: Keyed-Hashing for Message Authentication
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
27
-
-
59249096842
-
-
B. Kaliski, PKCS #5: Password-Based Cryptography Specification, Sept. 2000, RFC 2898, http://www.ietf.org/rfc/rfc2898.txt.
-
B. Kaliski, "PKCS #5: Password-Based Cryptography Specification," Sept. 2000, RFC 2898, http://www.ietf.org/rfc/rfc2898.txt.
-
-
-
-
29
-
-
34548134027
-
I-Living: An open system architecture for assisted living
-
Q. Wang, W. Shin, X. Liu, Z. Zeng, C. Oh, B. Al-Shebli, M. Caccamo, C. Gunter, E. Gunter, J. Hou, K. Karahalios, and L. Sha, "I-Living: An open system architecture for assisted living," in Proceedings of the IEEE SMC, 2006.
-
(2006)
Proceedings of the IEEE SMC
-
-
Wang, Q.1
Shin, W.2
Liu, X.3
Zeng, Z.4
Oh, C.5
Al-Shebli, B.6
Caccamo, M.7
Gunter, C.8
Gunter, E.9
Hou, J.10
Karahalios, K.11
Sha, L.12
-
30
-
-
48349090370
-
PAS: A wireless-enabled, sensor-integrated personal assistance system for independent and assisted living
-
June
-
J. C. Hou, et al., "PAS: A wireless-enabled, sensor-integrated personal assistance system for independent and assisted living," Proc. of Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability (HCMDSS/MD PnP'07), June 2007.
-
(2007)
Proc. of Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability (HCMDSS/MD PnP'07)
-
-
Hou, J.C.1
-
32
-
-
1542286901
-
Fast authenticated key easfblishment protocols for self-organizing sensor networks
-
Q. Zhang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, "Fast authenticated key easfblishment protocols for self-organizing sensor networks," in Proceedings of the 2nd. ACM International Conference on Wireless Sensor Networks and Applications, 2003, pp. 141-150.
-
(2003)
Proceedings of the 2nd. ACM International Conference on Wireless Sensor Networks and Applications
, pp. 141-150
-
-
Zhang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
33
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks," in Proceedings of the ACM MOBICOM, 2001.
-
(2001)
Proceedings of the ACM MOBICOM
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
35
-
-
51249114416
-
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
-
NIST, "Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, Special Publication 800-56A," 2007, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A-Revisionl-Mar. 08-2007.pdf.
-
(2007)
Special Publication
, vol.800-56A
-
-
|