Sciweavers

2945 search results - page 413 / 589
» Noisy Network Coding
Sort
View
PERCOM
2007
ACM
15 years 10 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
MOBISYS
2003
ACM
15 years 10 months ago
Full TCP/IP for 8-Bit Architectures
We describe two small and portable TCP/IP implementations fulfilling the subset of RFC1122 requirements needed for full host-to-host interoperability. Our TCP/IP implementations d...
Adam Dunkels
AINA
2009
IEEE
15 years 5 months ago
Quantitative Evaluation of Software Quality Metrics in Open-Source Projects
The validation of software quality metrics lacks statistical significance. One reason for this is that the data collection requires quite some effort. To help solve this problem,...
Henrike Barkmann, Rüdiger Lincke, Welf Lö...
NDSS
2009
IEEE
15 years 5 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...
IPPS
2009
IEEE
15 years 5 months ago
Validating Wrekavoc: A tool for heterogeneity emulation
Experimental validation and testing of solutions designed for heterogeneous environment is a challenging issue. Wrekavoc is a tool for performing such validation. It runs unmodi...
Olivier Dubuisson, Jens Gustedt, Emmanuel Jeannot