Sciweavers

709 search results - page 79 / 142
» In-stroke word completion
Sort
View
PERCOM
2005
ACM
15 years 11 months ago
Mobile data collection in sensor networks: The TinyLime
In this paper we describe TinyLime, a novel middleware for wireless sensor networks that departs from the traditional setting where sensor data is collected by a central monitorin...
Carlo Curino, Matteo Giani, Marco Giorgetta, Aless...
ACSAC
2009
IEEE
15 years 6 months ago
A Study of User-Friendly Hash Comparison Schemes
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassan...
RECONFIG
2009
IEEE
269views VLSI» more  RECONFIG 2009»
15 years 6 months ago
A 10 Gbps OTN Framer Implementation Targeting FPGA Devices
Abstract—Integrated circuits for very high-speed telecommunication protocols often use ASICs, due to their strict timing constraints. This scenario is changing, since modern FPGA...
Guilherme Guindani, Frederico Ferlini, Jeferson Ol...
TRUST
2009
Springer
15 years 6 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
ER
2009
Springer
111views Database» more  ER 2009»
15 years 6 months ago
A New Point Access Method Based on Wavelet Trees
Abstract. The development of index structures that allow ecient retrieval of spatial objects has been a topic of interest in the last decades. Most of these structures have been d...
Nieves R. Brisaboa, Miguel Rodríguez Luaces...