Sciweavers

1368 search results - page 232 / 274
» UXnet: making connections
Sort
View
ISCIS
2004
Springer
15 years 3 months ago
Relay Attacks on Bluetooth Authentication and Solutions
We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to bo...
Albert Levi, Erhan Çetintas, Murat Aydos, &...
ETELEMED
2010
IEEE
216views Healthcare» more  ETELEMED 2010»
15 years 3 months ago
Enhancing Rural Healthcare in Emerging Countries through an eHealth Solution
— This paper investigates the applicability of an eSolution that improves healthcare delivery settings in the rural parts of the developing world and discusses about a proposed p...
Saatviga Sudhahar, Dinusha Vatsalan, Dulindra Wije...
ICDS
2010
IEEE
15 years 3 months ago
Modeling and Analysis of Laws Using BPR and Goal-Oriented Framework
Abstract—Recently, two complementary approaches are proposed to represent, model and analyze laws: the Nomos and VLPM approaches. Nomos is a goal-oriented approach to effectively...
Adolfo Villafiorita, Komminist Weldemariam, Angelo...
CCGRID
2003
IEEE
15 years 3 months ago
An Exposed Approach to Reliable Multicast in Heterogeneous Logistical Networks
An exposed approach in computer service architecture is one that offers client software a primitive service whose semantics are closely based on the underlying physical infrastruc...
Micah Beck, Ying Ding 0002, Erika Fuentes, Sharmil...
FTDCS
2003
IEEE
15 years 3 months ago
pFilter: Global Information Filtering and Dissemination Using Structured Overlay Networks
The exponential data growth rate of the Internet makes it increasingly difficult for people to find desired information in a timely fashion. Information filtering and dissemina...
Chunqiang Tang, Zhichen Xu