Sciweavers

422 search results - page 68 / 85
» Protocol Specialization
Sort
View
97
Voted
WPES
2004
ACM
15 years 7 months ago
Soft blocking: flexible blocker tags on the cheap
A “blocker” tag is a form of privacy-enhancing radio-frequency identification (RFID) tag. It operates by interfering with the protocol in which a reader communicates individua...
Ari Juels, John G. Brainard
132
Voted
SENSYS
2003
ACM
15 years 7 months ago
Bluetooth and sensor networks: a reality check
The current generation of sensor nodes rely on commodity components. The choice of the radio is particularly important as it impacts not only energy consumption but also software ...
Martin Leopold, Mads Bondo Dydensborg, Philippe Bo...
COMPUTER
2002
121views more  COMPUTER 2002»
15 years 1 months ago
The Interspace: Concept Navigation Across Distributed Communities
ectly support interaction with abstraction. Using technologies that go beyond searching individual repositories to analyzing and correlating knowledge across multiple sources and s...
Bruce R. Schatz
MM
2006
ACM
119views Multimedia» more  MM 2006»
15 years 7 months ago
Modelling dependency in multimedia streams
Expressing and analysing data dependency in multimedia streams is promising, since content-aware policies at a transport level would benefit from such services. In this paper we ...
Alexander Eichhorn
HYBRID
1998
Springer
15 years 6 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch