Sciweavers

268 search results - page 27 / 54
» An Analysis of Bitstate Hashing
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
Defining Strong Privacy for RFID
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is threefold: (1) We propose a simple, formal definition of strong privacy usef...
Ari Juels, Stephen A. Weis
IPPS
2007
IEEE
14 years 3 months ago
Performance Modelling of Peer-to-Peer Routing
We propose several models based on discrete-time Markov chains for the analysis of Distributed Hash Tables (DHTs). Specifically, we examine the Pastry routing protocol, as well a...
Idris A. Rai, Andrew Brampton, Andrew MacQuire, La...
JOT
2006
119views more  JOT 2006»
13 years 9 months ago
An efficient multiversion access control in a Temporal Object Oriented Database
Many data base applications require the storage and manipulation of different versions of data objects. To satisfy the diverse needs of these applications, current database system...
Gurusamy Arumugam, Muthuraman Thangaraj
HCI
2009
13 years 6 months ago
AR City Representation System Based on Map Recognition Using Topological Information
This paper presents a system for overlaying 3D GIS data information such as 3D buildings onto a 2D physical urban map. We propose a map recognition framework by analysis of distrib...
Hideaki Uchiyama, Hideo Saito, Myriam Servieres, G...
CCS
2001
ACM
14 years 1 months ago
The faithfulness of abstract protocol analysis: message authentication
hfulness of Abstract Protocol Analysis: Message Authentication∗ Joshua D. Guttman F. Javier Thayer Lenore D. Zuck December 18, 2002 Dolev and Yao initiated an approach to studyi...
Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuc...