Sciweavers

9218 search results - page 75 / 1844
» RFID Technology and Applications
Sort
View
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
15 years 10 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
CHI
2005
ACM
15 years 10 months ago
Smart sinks: real-world opportunities for context-aware interaction
Can implicit interaction with a computer easily drive useful interface improvements in physical world settings? This paper presents a case study presenting multiple such context-a...
Leonardo Bonanni, Ernesto Arroyo, Chia-Hsun Lee, T...
EUC
2005
Springer
15 years 3 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
HT
2003
ACM
15 years 3 months ago
"Physical hypermedia": organising collections of mixed physical and digital material
This paper addresses the problem of organizing material in mixed digital and physical environments. It presents empirical examples of how people use collectional artefacts and org...
Kaj Grønbæk, Jannie Friis Kristensen,...
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
14 years 10 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...