Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1790
search results - page 34 / 358
»
On Privacy Models for RFID
Sort
relevance
views
votes
recent
update
View
thumb
title
93
click to vote
CRITIS
2008
99
views
Security Privacy
»
more
CRITIS 2008
»
Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach
15 years 3 months ago
Download
critis08.dia.uniroma3.it
Emiliano Casalicchio, Emanuele Galli, Salvatore Tu...
claim paper
Read More »
84
click to vote
CRITIS
2008
74
views
Security Privacy
»
more
CRITIS 2008
»
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking
15 years 3 months ago
Download
critis08.dia.uniroma3.it
Anas Abou El Kalam, Yves Deswarte
claim paper
Read More »
97
click to vote
ISSE
2010
125
views
Security Privacy
»
more
ISSE 2010
»
Lightweight analysis of access control models with description logic
15 years 12 days ago
Download
www.artist-embedded.org
Christiano Braga, Edward Hermann Haeusler
claim paper
Read More »
132
click to vote
ISSE
2011
228
views
Security Privacy
»
more
ISSE 2011
»
Representativeness models of systems: smart grid example
14 years 9 months ago
Download
paris.utdallas.edu
Norman F. Schneidewind
claim paper
Read More »
122
click to vote
ICSNC
2007
IEEE
134
views
Communications
»
more
ICSNC 2007
»
Efficient Transformation Scheme for Indexing Continuous Queries on RFID Streaming Data
15 years 8 months ago
Download
dblab.pusan.ac.kr
RFID data are usually regarded as streaming data that are huge and change frequently because they are gathered continuously by numerous readers. RFID middleware filters the data a...
Jaekwan Park, Bonghee Hong, ChaeHoon Ban
claim paper
Read More »
« Prev
« First
page 34 / 358
Last »
Next »