Sciweavers

78 search results - page 6 / 16
» A Truly Magic Solution
Sort
View
PERCOM
2005
ACM
14 years 6 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
COMSWARE
2008
IEEE
14 years 1 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
GW
2005
Springer
120views Biometrics» more  GW 2005»
14 years 7 days ago
Recognition of Deictic Gestures for Wearable Computing
In modern society there is an increasing demand to access, record and manipulate large amounts of information. This has inspired a new approach to thinking about and designing pers...
Thomas B. Moeslund, Lau Nørgaard
WSC
1998
13 years 8 months ago
Integrated Modeling and Analysis Generator Environment (IMAGE): A Decision Support Tool
A truly integrated modeling and analysis environment, which facilitates multi-use and multi-tool models, is necessary for today's enterprises to meet the challenges of the co...
Dursun Delen, Perakath C. Benjamin, Madhav Erragun...
COMPUTING
2006
119views more  COMPUTING 2006»
13 years 6 months ago
Sparse Grids, Adaptivity, and Symmetry
Sparse grid methods represent a powerful and efficient technique for the representation and approximation of functions and particularly the solutions of partial differential equat...
Harry Yserentant