Sciweavers

2335 search results - page 402 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
SECURWARE
2008
IEEE
15 years 8 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
15 years 6 months ago
The Kalman like particle filter: Optimal estimation with quantized innovations/measurements
— We study the problem of optimal estimation using quantized innovations, with application to distributed estimation over sensor networks. We show that the state probability dens...
Ravi Teja Sukhavasi, Babak Hassibi
SIGMOD
2008
ACM
198views Database» more  SIGMOD 2008»
16 years 1 months ago
Efficient storage scheme and query processing for supply chain management using RFID
As the size of an RFID tag becomes smaller and the price of the tag gets lower, RFID technology has been applied to a wide range of areas. Recently, RFID has been adopted in the b...
Chun-Hee Lee, Chin-Wan Chung
152
Voted
KCAP
2011
ACM
14 years 4 months ago
LinkedDataLens: linked data as a network of networks
With billions of assertions and counting, the Web of Data represents the largest multi-contributor interlinked knowledge base that ever existed. We present a novel framework for a...
Yolanda Gil, Paul T. Groth
139
Voted
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
15 years 5 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...