Sciweavers

366 search results - page 46 / 74
» A Door Access Control System with Mobile Phones
Sort
View
MICRO
2000
IEEE
129views Hardware» more  MICRO 2000»
14 years 11 months ago
Architectural Considerations for CPU and Network Interface Integration
The popularity of the Internet and the emergence of broadband access networks is fueling the development of communications processors -- devices that integrate processing, network...
Charles D. Cranor, R. Gopalakrishnan, Peter Z. Onu...
WISA
2009
Springer
15 years 6 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
ICCD
2007
IEEE
195views Hardware» more  ICCD 2007»
15 years 3 months ago
LEMap: Controlling leakage in large chip-multiprocessor caches via profile-guided virtual address translation
The emerging trend of larger number of cores or processors on a single chip in the server, desktop, and mobile notebook platforms necessarily demands larger amount of on-chip last...
Jugash Chandarlapati, Mainak Chaudhuri
WICOMM
2011
14 years 6 months ago
The effects of shadow-fading on QoS-aware routing and admission control protocols designed for multi-hop MANETs
—Providing quality-of-service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralised coordin...
Lajos Hanzo, Rahim Tafazolli
MHCI
2009
Springer
15 years 6 months ago
Examining human values in adopting ubiquitous technology in school
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...