Sciweavers

7200 search results - page 1160 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
92
Voted
WS
2005
ACM
15 years 6 months ago
Strengthening EPC tags against cloning
The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emi...
Ari Juels
101
Voted
AP2PC
2005
Springer
15 years 6 months ago
Incentive-Compatibility in a Distributed Autonomous Currency System
Peer-to-peer complementary currencies can be powerful tools for promoting exchanges and building sustainable relationships among selfish peers on the Internet. i-WAT[10] is a prop...
Kenji Saito, Eiichi Morino, Jun Murai
CIARP
2005
Springer
15 years 6 months ago
Surface Grading Using Soft Colour-Texture Descriptors
Abstract. This paper presents a new approach to the question of surface grading based on soft colour-texture descriptors and well known classifiers. These descriptors come from gl...
Fernando López, José Miguel Valiente...
96
Voted
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 6 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
88
Voted
DCOSS
2005
Springer
15 years 6 months ago
Infrastructure-Establishment from Scratch in Wireless Sensor Networks
Abstract. We present a distributed, localized and integrated approach for establishing both low-level (i.e. exploration of 1-hop neighbors, interference avoidance) and high-level (...
Stefan Funke, Nikola Milosavljevic
« Prev « First page 1160 / 1440 Last » Next »