Sciweavers

13717 search results - page 2582 / 2744
» Control Systems
Sort
View
CCS
2008
ACM
15 years 5 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
CODES
2005
IEEE
15 years 5 months ago
Hardware/software partitioning of software binaries: a case study of H.264 decode
We describe results of a case study whose intent was to determine whether new techniques for hardware/software partitioning of an application’s binary are competitive with parti...
Greg Stitt, Frank Vahid, Gordon McGregor, Brian Ei...
AP2PC
2007
Springer
15 years 4 months ago
Information Sharing among Autonomous Agents in Referral Networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek and provide services, or refer other service providers. Key applications include service discove...
Yathiraj B. Udupi, Munindar P. Singh
BIOSIG
2008
170views Biometrics» more  BIOSIG 2008»
15 years 4 months ago
Frontex Perspectives on Biometrics for Border Checks
: The European Union is developing new concepts for border management. Biometrics is seen is a key technology to facilitate more secure and convenient border management. Biometric ...
Erik Berglund, Rasa Karbauskaite
LREC
2010
179views Education» more  LREC 2010»
15 years 4 months ago
A Context Sensitive Variant Dictionary for Supporting Variant Selection
In Japanese, there are a large number of notational variants of words. This is because Japanese words are written in three kinds of characters: kanji (Chinese) characters, hiragar...
Aya Nishikawa, Ryo Nishimura, Yasuhiko Watanabe, Y...
« Prev « First page 2582 / 2744 Last » Next »