Sciweavers

2229 search results - page 391 / 446
» Abstract Storage Devices
Sort
View
JCP
2006
120views more  JCP 2006»
13 years 8 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
KES
2008
Springer
13 years 8 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
KI
2008
Springer
13 years 8 months ago
The Enhancement of Low-Level Classifications for Ambient Assisted Living
Abstract. Assisted living means providing the assisted with custom services, specific to their needs and capabilities. Computer monitoring can supply some of these services, be it ...
Rachel E. Goshorn, Deborah Goshorn, Mathias Kö...
MAM
2006
125views more  MAM 2006»
13 years 8 months ago
Stream computations organized for reconfigurable execution
Reconfigurable systems can offer the high spatial parallelism and fine-grained, bit-level resource control traditionally associated with hardware implementations, along with the f...
André DeHon, Yury Markovsky, Eylon Caspi, M...
PERVASIVE
2006
Springer
13 years 8 months ago
Using a Live-In Laboratory for Ubiquitous Computing Research
Abstract. Ubiquitous computing researchers are increasingly turning to sensorenabled "living laboratories" for the study of people and technologies in settings more natur...
Stephen S. Intille, Kent Larson, Emmanuel Munguia ...