2002
DOI: 10.1007/3-540-45866-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Pushpin Computing System Overview: A Platform for Distributed, Embedded, Ubiquitous Sensor Networks

Abstract: Abstract.A hardware and software platform has been designed and implemented for modeling, testing, and deploying distributed peer-to-peer sensor networks comprised of many identical nodes. Each node possesses the tangible affordances of a commonplace pushpin to meet ease-of-use and power considerations. The sensing, computational, and communication abilities of a "Pushpin", as well as a "Pushpin" operating system supporting mobile computational processes are treated in detail. Example applications and future w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0
1

Year Published

2005
2005
2014
2014

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(51 citation statements)
references
References 7 publications
0
50
0
1
Order By: Relevance
“…For encrypted security, however, a very important aspectsensitivity to the plaintext cannot be well positioned to meet the plaintext attack. Chosen plaintext attack means that an attacker can use encryption system to encrypt and chosen plaintext through comparative analysis of changes between the plaintext and ciphertext so as to get the encryption key, crack secret text, and so on [11]. For instance, an attacker can choose different plaintexts of two images which is only one pixel contrast.…”
Section: Cyclicity Of Cat Mappingmentioning
confidence: 99%
“…For encrypted security, however, a very important aspectsensitivity to the plaintext cannot be well positioned to meet the plaintext attack. Chosen plaintext attack means that an attacker can use encryption system to encrypt and chosen plaintext through comparative analysis of changes between the plaintext and ciphertext so as to get the encryption key, crack secret text, and so on [11]. For instance, an attacker can choose different plaintexts of two images which is only one pixel contrast.…”
Section: Cyclicity Of Cat Mappingmentioning
confidence: 99%
“…Other examples include C and Prothothreads for Contiki [2] and at the extreme Pushpin [9]. Moving away from the hardware and system level programming we have virtual machines like Maté [8] and its associated core language TinyScript that provide programmers with a suitable abstraction layer for the hardware.…”
Section: Related Workmentioning
confidence: 99%
“…'Networked Vest' [4] 'Push&Pin' system [5] aims at the network system on a pair of conductive surface, including conductive fabric wear as well as the wall, but it employs 1-Wire[6] system for physical implementation.…”
Section: Related Work On Wearable Network Systemmentioning
confidence: 99%