Sciweavers

1583 search results - page 88 / 317
» The Quorum Deployment Problem
Sort
View
131
Voted
USS
2008
15 years 5 months ago
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties wit
We tackle the problem of building privacy-preserving device-tracking systems -- or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. T...
Thomas Ristenpart, Gabriel Maganis, Arvind Krishna...
158
Voted
ICDCS
2010
IEEE
15 years 5 months ago
ASAP: Scalable Identification and Counting for Contactless RFID Systems
The growing importance of operations such as identification, location sensing and object tracking has led to increasing interests in contactless Radio Frequency Identification (RFI...
Chen Qian, Yunhuai Liu, Hoilun Ngan, Lionel M. Ni
PERCOM
2010
ACM
15 years 5 months ago
Engineering energy-efficient target detection applications in Wireless Sensor Networks
This paper addresses the problem of engineering energy-efficient target detection applications using unattended Wireless Sensor Networks (WSNs) for long-lasting surveillance of are...
Paolo Medagliani, Jeremie Leguay, Vincent Gay, Mar...
DAIS
2007
15 years 4 months ago
Component Adaptation in Contemporary Execution Environments
Because they are required to support component deployment and composition, modern execution environments embody a number of common features such as dynamic linking and support for ...
Susan Eisenbach, Chris Sadler, Dominic Wong
ECIS
2004
15 years 4 months ago
Evaluating integration approaches benefits adopted by healthcare organisations
Healthcare organizations consist of a large number of disparate information systems (IS). These have been deployed to support specific needs of healthcare organisations. The infor...
Khalil Khoumbati, Marinos Themistocleous, Zahir Ir...