Sciweavers

21324 search results - page 3973 / 4265
» Making the case for computing
Sort
View
115
Voted
CCS
2010
ACM
15 years 10 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
128
Voted
IPSN
2010
Springer
15 years 10 months ago
Online distributed sensor selection
A key problem in sensor networks is to decide which sensors to query when, in order to obtain the most useful information (e.g., for performing accurate prediction), subject to co...
Daniel Golovin, Matthew Faulkner, Andreas Krause
143
Voted
BSN
2009
IEEE
145views Sensor Networks» more  BSN 2009»
15 years 10 months ago
Accurate, Fast Fall Detection Using Gyroscopes and Accelerometer-Derived Posture Information
—Falls are dangerous for the aged population as they can adversely affect health. Therefore, many fall detection systems have been developed. However, prevalent methods only use ...
Qiang Li, John A. Stankovic, Mark A. Hanson, Adam ...
IDTRUST
2009
ACM
15 years 10 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
MSWIM
2009
ACM
15 years 10 months ago
How do wireless chains behave?: the impact of MAC interactions
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
« Prev « First page 3973 / 4265 Last » Next »