Sciweavers

6229 search results - page 1162 / 1246
» Models of Computation for Networks on Chip
Sort
View
103
Voted
MOBISYS
2008
ACM
16 years 12 days ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
114
Voted
PERCOM
2009
ACM
15 years 7 months ago
NoShake: Content Stabilization for Shaking Screens of Mobile Devices
—Consumer electronics and mobile devices intended for pervasive applications are often subject to shaking that makes their screen difficult to read. To address this usability cha...
Ahmad Rahmati, Clayton Shepard, Lin Zhong
105
Voted
CODES
2008
IEEE
15 years 7 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
116
Voted
LCN
2007
IEEE
15 years 7 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
112
Voted
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 7 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
« Prev « First page 1162 / 1246 Last » Next »