Sciweavers

2363 search results - page 440 / 473
» How Secure is RFID
Sort
View
FI
2010
143views more  FI 2010»
14 years 11 months ago
Implementing Value Added Applications in Next Generation Networks
: One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs) are also telec...
Yeh-Chin Ho, Yi-Bing Lin, Ren-Huang Liou, Yuan-Kua...
MOR
2010
115views more  MOR 2010»
14 years 11 months ago
Directional Derivatives of Oblique Reflection Maps
Given an oblique reflection map and functions , Dlim (the space of functions that have left and right limits at every point), the directional derivative () of along , evaluate...
Avi Mandelbaum, Kavita Ramanan
INFOCOM
2011
IEEE
14 years 7 months ago
A highly scalable bandwidth estimation of commercial hotspot access points
—WiFi access points that provide Internet access to users have been steadily increasing in urban areas. Different access points differ from one another in terms of services that ...
Xinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Li...
ARESEC
2011
145views more  ARESEC 2011»
14 years 4 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
CLEF
2011
Springer
14 years 3 months ago
Towards a Living Lab for Information Retrieval Research and Development - A Proposal for a Living Lab for Product Search Tasks
Abstract. The notion of having a “living lab” to undertaken evaluations has been proposed by a number of proponents within the field of Information Retrieval (IR). However, wh...
Leif Azzopardi, Krisztian Balog