Sciweavers

3022 search results - page 61 / 605
» Make Way for WayMaker
Sort
View
115
Voted
SASO
2008
IEEE
15 years 7 months ago
Pervasive Self-Learning with Multi-modal Distributed Sensors
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...
145
Voted
IPCCC
2007
IEEE
15 years 6 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton
111
Voted
ISCAS
2007
IEEE
99views Hardware» more  ISCAS 2007»
15 years 6 months ago
A Parallel Architecture for Hermitian Decoders: Satisfying Resource and Throughput Constraints
— Hermitian Codes offer desirable properties such as large code lengths, good error-correction at high code rates, etc. The main problem in making Hermitian codes practical is to...
Rachit Agarwal, Emanuel M. Popovici, Brendan O'Fly...
118
Voted
LICS
2007
IEEE
15 years 6 months ago
Principles of Superdeduction
In predicate logic, the proof that a theorem P holds in a theory Th is typically conducted in natural deduction or in the sequent calculus using all the information contained in t...
Paul Brauner, Clément Houtmann, Claude Kirc...
123
Voted
RTCSA
2007
IEEE
15 years 6 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...