Sciweavers

1845 search results - page 291 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
ICDS
2010
IEEE
15 years 8 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
TEI
2010
ACM
144views Hardware» more  TEI 2010»
15 years 8 months ago
Tangible jukebox: back to palpable music
Since commercial musical recordings became available about a century ago and until very recently, they had always been distributed by means of a physical support. Nowadays that re...
Daniel Gallardo, Sergi Jordà
BSN
2009
IEEE
137views Sensor Networks» more  BSN 2009»
15 years 8 months ago
Technologies for an Autonomous Wireless Home Healthcare System
We present a design study highlighting our recent technological developments that will enable the implementation of autonomous wireless sensor networks for home healthcare monitori...
Christine Ho, Michael Mark, Michael Koplow, Lindsa...
WIMOB
2009
IEEE
15 years 8 months ago
Media Caching Support for Mobile Transit Clients
—In this paper, we consider the design of caching infrastructure to enhance the client-perceived performance of mobile wireless clients retrieving multimedia objects from the Int...
Hazem Gomaa, Geoffrey G. Messier, Robert J. Davies...
WEBDB
2009
Springer
100views Database» more  WEBDB 2009»
15 years 8 months ago
Towards Well-Behaved Schema Evolution
We study the problem of schema evolution in the RDF data model. RDF and the RDFS schema language are W3C standards for flexibly modeling and sharing data on the web. Although sch...
Rada Chirkova, George H. L. Fletcher