Sciweavers

610 search results - page 92 / 122
» Predicate-Based Key Exchange
Sort
View
UCS
2007
Springer
15 years 11 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
143
Voted
ICMCS
2006
IEEE
170views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Bit-Stream Switching in Multiple Bit-Rate Video Streaming using Wyner-Ziv Coding
It has been commonly recognized that multiple bit-rate (MBR) encoding provides a concise method for video streaming over bandwidth-fluctuant networks. The key problem of the MBR t...
Wen Sun, Yan Lu, Feng Wu
144
Voted
ISCA
2006
IEEE
107views Hardware» more  ISCA 2006»
15 years 11 months ago
Distributed Arithmetic on a Quantum Multicomputer
We evaluate the performance of quantum arithmetic algorithms run on a distributed quantum computer (a quantum multicomputer). We vary the node capacity and I/O capabilities, and t...
Rodney Van Meter, Kae Nemoto, W. J. Munro, Kohei M...
191
Voted
LCN
2006
IEEE
15 years 11 months ago
Biologically-Inspired Adaptive Data Aggregation for Multi-Modal Wireless Sensor Networks
This paper describes BiSNET (Biologically-inspired architecture for Sensor NETworks), which addresses several key issues in multi-modal wireless sensor networks such as autonomy, ...
Pruet Boonma, Junichi Suzuki
151
Voted
DEEC
2005
IEEE
15 years 11 months ago
Practical Issues for Building a Product Ontology System
A base of clearly defined product information is a key foundation for an e-commerce system. The manipulation and exchange of semantically enriched and precise product information ...
Ig-hoon Lee, Suekyung Lee, Taehee Lee, Sang-goo Le...