Sciweavers

859 search results - page 164 / 172
» Key Establishment for General Ad Hoc Network
Sort
View
DRM
2004
Springer
15 years 2 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
93
Voted
ESAS
2007
Springer
15 years 3 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
DIALM
2003
ACM
139views Algorithms» more  DIALM 2003»
15 years 2 months ago
dBBlue: low diameter and self-routing bluetooth scatternet
This paper addresses the problem of scatternet formation for singlehop Bluetooth based ad hoc networks, with minimal communication overhead. We adopt the well-known structure de B...
Wen-Zhan Song, Xiang-Yang Li, Yu Wang 0003, Weizha...
ENTCS
2006
180views more  ENTCS 2006»
14 years 9 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
104
Voted
SEMWEB
2010
Springer
14 years 7 months ago
Toponym Resolution in Social Media
Increasingly user-generated content is being utilised as a source of information, however each individual piece of content tends to contain low levels of information. In addition, ...
Neil Ireson, Fabio Ciravegna