Sciweavers

2162 search results - page 332 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 4 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
SECON
2007
IEEE
15 years 4 months ago
Log-normal shadowing meets SINR: A numerical study of Capacity in Wireless Networks
— The capacity of wireless multi-hop networks has been studied extensively in recent years. Most existing work tackles the problem from an asymptotic perspective and assumes a si...
Patrick Stuedi, Gustavo Alonso
CAIP
2007
Springer
182views Image Analysis» more  CAIP 2007»
15 years 4 months ago
Assessing Artery Motion Compensation in IVUS
Abstract. Cardiac dynamics suppression is a main issue for visual improvement and computation of tissue mechanical properties in IntraVascular UltraSound (IVUS). Although in recent...
Debora Gil, Oriol Rodriguez-Leor, Petia Radeva, Au...
EGOV
2007
Springer
15 years 4 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
BROADNETS
2006
IEEE
15 years 4 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...