Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1790
search results - page 34 / 358
»
On Privacy Models for RFID
Sort
relevance
views
votes
recent
update
View
thumb
title
126
click to vote
CRITIS
2008
99
views
Security Privacy
»
more
CRITIS 2008
»
Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach
15 years 7 months ago
Download
critis08.dia.uniroma3.it
Emiliano Casalicchio, Emanuele Galli, Salvatore Tu...
claim paper
Read More »
111
click to vote
CRITIS
2008
74
views
Security Privacy
»
more
CRITIS 2008
»
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking
15 years 7 months ago
Download
critis08.dia.uniroma3.it
Anas Abou El Kalam, Yves Deswarte
claim paper
Read More »
127
click to vote
ISSE
2010
125
views
Security Privacy
»
more
ISSE 2010
»
Lightweight analysis of access control models with description logic
15 years 3 months ago
Download
www.artist-embedded.org
Christiano Braga, Edward Hermann Haeusler
claim paper
Read More »
172
click to vote
ISSE
2011
228
views
Security Privacy
»
more
ISSE 2011
»
Representativeness models of systems: smart grid example
15 years 8 days ago
Download
paris.utdallas.edu
Norman F. Schneidewind
claim paper
Read More »
154
click to vote
ICSNC
2007
IEEE
134
views
Communications
»
more
ICSNC 2007
»
Efficient Transformation Scheme for Indexing Continuous Queries on RFID Streaming Data
15 years 11 months ago
Download
dblab.pusan.ac.kr
RFID data are usually regarded as streaming data that are huge and change frequently because they are gathered continuously by numerous readers. RFID middleware filters the data a...
Jaekwan Park, Bonghee Hong, ChaeHoon Ban
claim paper
Read More »
« Prev
« First
page 34 / 358
Last »
Next »