Sciweavers

39 search results - page 2 / 8
» Negotiate power and performance in the reality of RFID syste...
Sort
View
PERCOM
2005
ACM
14 years 4 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
MMB
2004
Springer
142views Communications» more  MMB 2004»
13 years 10 months ago
Trends and Developments in ICT Industry: New Challenges for Performance Analysts
In the next few years the landscape of the information and communications technology (ICT) industry will be subject to many changes. New and advanced ICT services will be brought ...
Robert D. van der Mei, Bart Gijsen
SECON
2007
IEEE
13 years 11 months ago
Facilitating an Active Transmit-only RFID System Through Receiver-based Processing
— Many asset tracking applications demand long-lived, low-cost, and continuous monitoring of a large number of items, which has posed a significant challenge to today’s RFID d...
Yu Zhang, Gautam D. Bhanage, Wade Trappe, Yanyong ...
AUTOID
2005
IEEE
13 years 10 months ago
An Ultra-Low Power, Optically-Interrogated Smart Tagging and Identification System
We present a wireless identification system that employs an optical communications link between an array of uniquely identifiable smart tags and an interrogator flashlight. As the...
Gerardo Barroeta Perez, Mateusz Malinowski, Joseph...
RTAS
1997
IEEE
13 years 9 months ago
QoS Negotiation in Real-Time Systems and Its Application to Automated Flight Control
ÐReal-time middleware services must guarantee predictable performance under specified load and failure conditions, and ensure graceful degradation when these conditions are violat...
Tarek F. Abdelzaher, Ella M. Atkins, Kang G. Shin