Sciweavers

3524 search results - page 104 / 705
» Issues in Active Databases
Sort
View
116
Voted
HIPC
2003
Springer
15 years 8 months ago
FV-MSB: A Scheme for Reducing Transition Activity on Data Buses
Power consumption becomes an important issue for modern processors. The off-chip buses consume considerable amount of total power [9,7]. One effective way to reduce power is to red...
Dinesh C. Suresh, Jun Yang 0002, Chuanjun Zhang, B...
122
Voted
EUC
2007
Springer
15 years 7 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
124
Voted
INTERACT
2007
15 years 4 months ago
PaperCP: Exploring the Integration of Physical and Digital Affordances for Active Learning
Active Learning in the classroom domain presents an interesting case for integrating physical and digital affordances. Traditional physical handouts and transparencies are giving w...
Chunyuan Liao, François Guimbretière...
124
Voted
ECIS
2004
15 years 4 months ago
Activity Based generation of requirements for web-based information systems: the SSM/ICDT approach
Web site development method is at an early stage in its evolution. Most existing methods are concerned with technical software issues and are poorly adapted to help developers thi...
Mary Meldrum, Jeremy Rose
226
Voted
IJACT
2008
136views more  IJACT 2008»
15 years 3 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta