Sciweavers

5068 search results - page 814 / 1014
» Basic Computations in Wireless Networks
Sort
View
PERCOM
2006
ACM
16 years 4 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
PERCOM
2006
ACM
16 years 4 months ago
Omero: Ubiquitous User Interfaces in the Plan B Operating System
It is difficult to build user interfaces that must be distributed over a set of dynamic and heterogeneous I/O devices. This difficulty increases when we want to split, merge, repl...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...
PERCOM
2006
ACM
16 years 4 months ago
Transmission control scheme for fast RFID object identification
There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a co...
Christian Floerkemeier
PERCOM
2006
ACM
16 years 4 months ago
Proximity Based Access Control in Smart-Emergency Departments
In this paper, we propose a Proximity Based automated Access Control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administ...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
PERCOM
2006
ACM
16 years 4 months ago
Balancing Autonomy and User Control in Context-Aware Systems - a Survey
Application autonomy can reduce interactions with users, ease the use of the system, and decrease user distraction. On the other hand, users may feel loss of control over their ap...
Bob Hardian, Jadwiga Indulska, Karen Henricksen