Sciweavers

4190 search results - page 454 / 838
» Implementing commitment-based interactions
Sort
View
INDOCRYPT
2009
Springer
15 years 11 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
IWMM
2009
Springer
125views Hardware» more  IWMM 2009»
15 years 11 months ago
Precise garbage collection for C
Magpie is a source-to-source transformation for C programs that enables precise garbage collection, where precise means that integers are not confused with pointers, and the liven...
Jon Rafkind, Adam Wick, John Regehr, Matthew Flatt
149
Voted
IWSOS
2009
Springer
15 years 11 months ago
A Self-organizing Approach to Activity Recognition with Wireless Sensors
Abstract. In this paper, we describe an approach to activity recognition, which is based on a self-organizing, ad hoc network of body-worn sensors. It makes best use of the availab...
Clemens Holzmann, Michael Haslgrübler
135
Voted
QI
2009
Springer
160views Physics» more  QI 2009»
15 years 11 months ago
Beyond Ontology in Information Systems
Abstract. Information systems are socio-technical systems. Their design, analysis and implementation requires appropriate languages for representing social and technical concepts. ...
Christian Flender, Kirsty Kitto, Peter Bruza
SEKE
2009
Springer
15 years 11 months ago
An Agent-based Centralized e-Marketplace in a Virtual Environment
In this paper we present the design and implementation of an agent-mediated B2C e-Marketplace as part of the social and immersive 3D e-Tourism environment “Itchy Feet”. Custom...
Ingo Seidel, Markus Gärtner, Josef Froschauer...