Sciweavers

981 search results - page 133 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
LOCA
2009
Springer
15 years 8 months ago
Bluetooth Tracking without Discoverability
Outdoor location-based services are now prevalent due to advances in mobile technology and GPS. Indoors, however, even coarse location remains unavailable. Bluetooth has been ident...
Simon Hay, Robert Harle
DATE
2003
IEEE
106views Hardware» more  DATE 2003»
15 years 6 months ago
Reconfigurable Signal Processing in Wireless Terminals
In this paper, we show the necessity of reconfigurable hardware for data and signal processing in wireless mobile terminals. We first identify the key processing power requirement...
Jürgen Helmschmidt, Eberhard Schüler, Pr...
AAAI
2000
15 years 2 months ago
Recognizing End-User Transactions in Performance Management
Providing good quality of service (e.g., low response times) in distributed computer systems requires measuring enduser perceptions of performance. Unfortunately, such measures ar...
Joseph L. Hellerstein, T. S. Jayram, Irina Rish
AROBOTS
2007
159views more  AROBOTS 2007»
15 years 1 months ago
Structure-based color learning on a mobile robot under changing illumination
— A central goal of robotics and AI is to be able to deploy an agent to act autonomously in the real world over an extended period of time. To operate in the real world, autonomo...
Mohan Sridharan, Peter Stone
115
Voted
FSTTCS
2003
Springer
15 years 6 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh