Sciweavers

4564 search results - page 523 / 913
» Data Integration Using ID-Logic
Sort
View
136
Voted
ICIP
2004
IEEE
16 years 5 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu
144
Voted
DAC
2003
ACM
16 years 4 months ago
A low-energy chip-set for wireless intercom
A low power wireless intercom system is designed and implemented. Two fully-operational ASICs, integrating custom and commercial IP, implement the entire digital portion of the pr...
M. Josie Ammer, Michael Sheets, Tufan C. Karalar, ...
124
Voted
PERCOM
2008
ACM
16 years 3 months ago
Data-centric middleware for context-aware pervasive computing
The complexity of developing and deploying context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggre...
Guanling Chen, Ming Li, David Kotz
121
Voted
PERCOM
2004
ACM
16 years 3 months ago
"Yoking-Proofs" for RFID Tags
RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility i...
Ari Juels
127
Voted
ICWS
2009
IEEE
16 years 20 days ago
Service Provenance in QoS-Aware Web Service Runtimes
In general, provenance of electronic data represents an important issue in information systems. So far, Serviceoriented Computing research has mainly focused on provenance of data...
Anton Michlmayr, Florian Rosenberg, Philipp Leitne...