Sciweavers

331 search results - page 16 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
RV
2010
Springer
177views Hardware» more  RV 2010»
14 years 8 months ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
NETWORKING
2004
14 years 11 months ago
On the Feasibility of Integrated MPEG Teleconference and Data Transmission, over IEEE 802.11 WLANs
The most widespread Wireless Local Area Networks (WLANs) are based today on the IEEE 802.11 standard and its various versions, especially the IEEE 802.11b. In this article we first...
Ioannis Broustis, Michael Paterakis
MASS
2010
156views Communications» more  MASS 2010»
14 years 7 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
IVA
2009
Springer
15 years 4 months ago
A Socially-Aware Memory for Companion Agents
Abstract. Memory is a vital capability for intelligent social Companions. In this paper, we introduce a simple memory model that allows a Companion to maintain a long-term relation...
Mei Yii Lim, Ruth Aylett, Wan Ching Ho, Sibylle En...
90
Voted
WISEC
2010
ACM
15 years 2 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...