Sciweavers

44 search results - page 4 / 9
» soups 2009
Sort
View
SOUPS
2009
ACM
14 years 14 days ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
PERCOM
2009
ACM
14 years 23 days ago
A Letter Soup for the Quality of Information in Sensor Networks
—In this paper, an information grouping paradigm for QoI in sensor networks is introduced. First, a definition of QoI is presented by analyzing the ITU’s definition of QoS. T...
Chatschik Bisdikian, Joel W. Branch, Kin K. Leung,...
CVPR
2009
IEEE
15 years 1 months ago
Alphabet SOUP: A Framework for Approximate Energy Minimization
Many problems in computer vision can be modeled using conditional Markov random fields (CRF). Since finding the maximum a posteriori (MAP) solution in such models is NP-hard, mu...
Stephen Gould (Stanford University), Fernando Amat...
SOUPS
2009
ACM
14 years 14 days ago
Not one click for security?
: © Not One Click for Security Alan H. Karp, Marc Stiegler, Tyler Close HP Laboratories HPL-2009-53 Secure cooperation, usable security Conventional wisdom holds that security mus...
Alan H. Karp, Marc Stiegler, Tyler Close
SOUPS
2009
ACM
14 years 14 days ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs