Sciweavers

45 search results - page 7 / 9
» Computer managed, open question, open book assessment
Sort
View
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
13 years 9 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
ICCS
2009
Springer
13 years 12 months ago
Distinguishing Answers in Conceptual Graph Knowledge Bases
Abstract. In knowledge bases, the open world assumption and the ability to express variables may lead to an answer redundancy problem. This problem occurs when the returned answers...
Nicolas Moreau, Michel Leclère, Madalina Cr...
POS
1998
Springer
13 years 9 months ago
Concurrency - The Fly in the Ointment?
Concurrency is a central pillar of the Java programming language, is implicit in the transactional model of computation adopted by most persistent systems, and has been widely stu...
Stephen Blackburn, John N. Zigman
GVD
2009
191views Database» more  GVD 2009»
13 years 3 months ago
Query Processing on Multi-Core Architectures
The upcoming generation of computer hardware poses several new challenges for database developers and engineers. Software in general and database management systems (DBMSs) in par...
Frank Huber, Johann Christoph Freytag
IWCMC
2010
ACM
13 years 10 months ago
CRABSS: CalRAdio-Based advanced Spectrum Scanner for cognitive networks
The first step required by the process of cognition is the intelligent observation of the environment that surrounds the actors of such a process. We present the CalRAdio-Based a...
Riccardo Manfrin, Luca Boscato, Andrea Zanella, Mi...