Sciweavers

575 search results - page 31 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
IWRT
2008
109views Communications» more  IWRT 2008»
13 years 9 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
HYBRID
2000
Springer
13 years 11 months ago
Computing Optimal Operation Schemes for Chemical Plants in Multi-batch Mode
We propose a computer-aided methodology to automatically generate time optimal production schemes for chemical batch plants operating in multi-batch mode. Our approach is based on ...
Peter Niebert, Sergio Yovine
CSE
2009
IEEE
14 years 2 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi
BSN
2009
IEEE
155views Sensor Networks» more  BSN 2009»
14 years 2 months ago
A Wearable Fabric Computer by Planar-Fashionable Circuit Board Technique
— A method to fabricate circuits on the cloth, planar fashionable circuit board (P-FCB), is proposed. And its applications such as fabric passive elements, user I/O interface, an...
Hyejung Kim, Yongsang Kim, Binhee Kim, Hoi-Jun Yoo
DGO
2004
108views Education» more  DGO 2004»
13 years 9 months ago
A Project to Assess Voting Technology and Ballot Design
The interdisciplinary project uses a variety of research designs, data collection methodologies, and analysis techniques and two ballot designs to assess five commercially availab...
Paul S. Herrnson, Richard G. Niemi, Benjamin B. Be...