Sciweavers

69 search results - page 10 / 14
» Mobile Channels, Implementation Within and Outside Component...
Sort
View
92
Voted
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
ICNP
2000
IEEE
15 years 2 months ago
TCP-Probing: Towards an Error Control Schema with Energy and Throughput Performance Gains
Today’s universal communications increasingly involve mobile and battery-powered devices (e.g. hand-held, laptop) over wired and wireless networks. Energy efficiency, as well as...
Vassilios Tsaoussidis, Hussein G. Badr
CHI
2004
ACM
15 years 10 months ago
Gummi: a bendable computer
Gummi is an interaction technique and device concept based on physical deformation of a handheld device. The device consists of several layers of flexible electronic components, i...
Carsten Schwesig, Ivan Poupyrev, Eijiro Mori
IPSN
2005
Springer
15 years 3 months ago
The particle computer system
Abstract—This paper presents a sensor-based, networked embedded system, referred to as the Particle computer system. It is comprised of tiny wireless sensor nodes, capable of com...
Christian Decker, Albert Krohn, Michael Beigl, Tob...
ANSS
2005
IEEE
15 years 3 months ago
J-Sim: A Simulation Environment for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have gained considerable attention in the past few years. As such, there has been an increasing need for defining and developing simulation framew...
Ahmed Sobeih, Wei-Peng Chen, Jennifer C. Hou, Lu-C...