Sciweavers

3747 search results - page 70 / 750
» Active Operations on Collections
Sort
View
NTMS
2008
IEEE
14 years 3 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
IJSS
2007
77views more  IJSS 2007»
13 years 8 months ago
Network-centric healthcare operations: data warehousing and the associated telecommunications platforms
: With the rapidly escalating costs, the EU and the US make the adoption and application of Information, Computer and Communication Technologies (ICCT) in healthcare (e-health) an ...
Dag Von Lubitz, Frédéric Patricelli
ICSE
2009
IEEE-ACM
14 years 9 months ago
Learning operational requirements from goal models
Goal-oriented methods have increasingly been recognised as an effective means for eliciting, elaborating, analysing and specifying software requirements. A key activity in these a...
Alessandra Russo, Dalal Alrajeh, Jeff Kramer, Seba...
CHI
2006
ACM
14 years 9 months ago
Design of a role-playing game to study the trajectories of health care workers in an operating room
Drawing on an ethnographic study of hospital work in an operating room, we present the design and implementation of a web-based role-playing application of a master schedule. We s...
Elisa Mattarelli, Kelly J. Fadel, Suzanne P. Weisb...
ICC
2007
IEEE
173views Communications» more  ICC 2007»
14 years 3 months ago
A Distributed Approach to Interference Mitigation Between OFDM-Based 802.16 Systems Operating in License-Exempt Spectrum
— An approach to mitigating interference between 802.16 license-exempt systems is proposed in this paper. More specifically, the approach focuses on solving problems which arise...
Omar Ashagi, Seán Murphy, Liam Murphy