-
1
-
-
49749085511
-
An efficient solar energy harvester for wireless sensor nodes
-
D. Brunelli, L. Benini, C. Moser, and L. Thiele. An efficient solar energy harvester for wireless sensor nodes. In DATE, 2008.
-
(2008)
DATE
-
-
Brunelli, D.1
Benini, L.2
Moser, C.3
Thiele, L.4
-
2
-
-
84873946697
-
Revisiting smart dust with RFID sensor networks
-
M. Buettner et al. Revisiting smart dust with RFID sensor networks. In HotNets, 2008.
-
(2008)
HotNets
-
-
Buettner, M.1
-
3
-
-
80051899035
-
Recognizing daily activities with RFID-based sensors
-
M. Buettner et al. Recognizing daily activities with RFID-based sensors. In Ubicomp, 2009.
-
(2009)
Ubicomp
-
-
Buettner, M.1
-
4
-
-
50249176295
-
Maximalist cryptography and computation on the WISP UHF RFID tag
-
H. J. Chae et al. Maximalist cryptography and computation on the WISP UHF RFID tag. In RFID Security, 2007.
-
(2007)
RFID Security
-
-
Chae, H.J.1
-
5
-
-
79953078626
-
Towards autonomously-powered CRFIDs
-
S. S. Clark et al. Towards autonomously-powered CRFIDs. In HotPower, 2009.
-
(2009)
HotPower
-
-
Clark, S.S.1
-
6
-
-
70349301622
-
RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
-
A. Czeskis et al. RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In CCS, 2008.
-
(2008)
CCS
-
-
Czeskis, A.1
-
8
-
-
77954968837
-
On the limits of effective micro-energy harvesting on mobile CRFID sensors
-
J. Gummeson, S. S. Clark, K. Fu, and D. Ganesan. On the limits of effective micro-energy harvesting on mobile CRFID sensors. In MobiSys, 2010.
-
(2010)
MobiSys
-
-
Gummeson, J.1
Clark, S.S.2
Fu, K.3
Ganesan, D.4
-
9
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Halperin, D.1
-
10
-
-
49049084590
-
Assessing and optimizing the range of UHF RFID to enable real-world pervasive computing applications
-
Springer-Verlag
-
S. Hodges et al. Assessing and optimizing the range of UHF RFID to enable real-world pervasive computing applications. In Pervasive Computing. Springer-Verlag, 2007.
-
(2007)
Pervasive Computing
-
-
Hodges, S.1
-
11
-
-
50249134033
-
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
-
D. E. Holcomb et al. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In RFID Security, 2007.
-
(2007)
RFID Security
-
-
Holcomb, D.E.1
-
12
-
-
33646950065
-
Perpetual environmentally powered sensor networks
-
X. Jiang, J. Polastre, and D. Culler. Perpetual environmentally powered sensor networks. In IPSN, 2005.
-
(2005)
IPSN
-
-
Jiang, X.1
Polastre, J.2
Culler, D.3
-
14
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
A. Mainwaring et al. Wireless sensor networks for habitat monitoring. In WSNA, 2002.
-
(2002)
WSNA
-
-
Mainwaring, A.1
-
17
-
-
10944269122
-
Inferring activities from interactions with objects
-
M. Philipose et al. Inferring activities from interactions with objects. IEEE Pervasive Computing, 2004.
-
(2004)
IEEE Pervasive Computing
-
-
Philipose, M.1
-
20
-
-
78751694609
-
Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling
-
B. Ransford et al. Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling. In HotPower, 2008.
-
(2008)
HotPower
-
-
Ransford, B.1
-
21
-
-
77954986303
-
The blue devil wisp: Expanding the frontiers of the passive RFID physical layer
-
M. Reynolds and S. Thomas. The blue devil wisp: Expanding the frontiers of the passive RFID physical layer. WISP Summit Workshop, 2009.
-
(2009)
WISP Summit Workshop
-
-
Reynolds, M.1
Thomas, S.2
-
22
-
-
77950320989
-
CCCP: Secure remote storage for computational RFIDs
-
M. Salajegheh et al. CCCP: Secure remote storage for computational RFIDs. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Salajegheh, M.1
-
23
-
-
67650565108
-
Experimental results with two wireless power transfer systems
-
A. Sample et al. Experimental results with two wireless power transfer systems. In IEEE Radio and Wireless Symposium, 2009.
-
(2009)
IEEE Radio and Wireless Symposium
-
-
Sample, A.1
-
26
-
-
79959890308
-
Eon: A language and runtime system for perpetual systems
-
J. Sorber et al. Eon: A Language and Runtime System for Perpetual Systems. In SENSYS, 2007.
-
(2007)
SENSYS
-
-
Sorber, J.1
-
27
-
-
51249102238
-
Design, modeling, and capacity planning for micro-solar power sensor networks
-
J. Taneja, J. Jeong, and D. Culler. Design, modeling, and capacity planning for micro-solar power sensor networks. In IPSN, 2008.
-
(2008)
IPSN
-
-
Taneja, J.1
Jeong, J.2
Culler, D.3
-
29
-
-
49049103638
-
Wirelessly-charged UHF tags for sensor data collection
-
D. Yeager, P. Powledge, R. Prasad, D. Wetherall, and J. Smith. Wirelessly-charged UHF tags for sensor data collection. In IEEE RFID, 2008.
-
(2008)
IEEE RFID
-
-
Yeager, D.1
Powledge, P.2
Prasad, R.3
Wetherall, D.4
Smith, J.5
-
30
-
-
77952196193
-
A 9.2a gen 2 compatible UHF RFID sensing tag with -12dbm sensitivity and 1.25vrms input-referred noise floor
-
D. Yeager, F. Zhang, A. Zarrasvand, and B. Otis. A 9.2a gen 2 compatible UHF RFID sensing tag with -12dbm sensitivity and 1.25vrms input-referred noise floor. ISSCC, 2010.
-
(2010)
ISSCC
-
-
Yeager, D.1
Zhang, F.2
Zarrasvand, A.3
Otis, B.4
|