Sciweavers

VAMOS
2016
Springer
10 years 12 days ago
Variability Modeling of Cryptographic Components: Clafer Experience Report
Software systems need to use cryptography to protect any sensitive data they collect. However, there are various classes of cryptographic components (e.g., ciphers, digests, etc.)...
Sarah Nadi, Stefan Krüger
UMUAI
2016
69views more  UMUAI 2016»
10 years 12 days ago
Automatic gaze-based user-independent detection of mind wandering during computerized reading
Mind wandering is a ubiquitous phenomenon where attention involuntarily shifts from task-related thoughts to internal task-unrelated thoughts. Mind wandering can have negative eff...
Robert Bixler, Sidney K. D'Mello
TWC
2016
91views more  TWC 2016»
10 years 12 days ago
Optimal Energy and Data Routing in Networks With Energy Cooperation
—We consider the delay minimization problem in an energy harvesting communication network with energy cooperation. In this network, nodes harvest energy from nature to sustain th...
Berk Gurakan, Omur Ozel, Sennur Ulukus
TWC
2016
87views more  TWC 2016»
10 years 12 days ago
On the Design of Temporal Compression Strategies for Energy Harvesting Sensor Networks
— Recent advances in energy harvesting devices and low-power embedded systems are enabling energetically self-sustainable wireless sensing systems able to sense, process, and wir...
Davide Zordan, Tommaso Melodia, Michele Rossi
TWC
2016
77views more  TWC 2016»
10 years 12 days ago
SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing
—The plummeting cost of Bluetooth tags and the ubiquity of mobile devices are revolutionizing the traditional lost-and-found service. This paper presents SecureFind, a secure and...
Jingchao Sun, Rui Zhang 0007, Xiaocong Jin, Yancha...