Sciweavers

5227 search results - page 869 / 1046
» Enterprise modeling using class and instance models
Sort
View
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
14 years 3 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup
INFOCOM
2006
IEEE
14 years 3 months ago
Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms
— Studying transfer opportunities between wireless devices carried by humans, we observe that the distribution of the inter-contact time, that is the time gap separating two cont...
Augustin Chaintreau, Pan Hui, Jon Crowcroft, Chris...
ISVLSI
2005
IEEE
101views VLSI» more  ISVLSI 2005»
14 years 2 months ago
eWatch: Context Sensitive System Design Case Study
In this paper, we introduce a novel context sensitive system design paradigm. Multiple sensors/ computational architecture, in the form of our eWatch device, is used to infer the ...
Asim Smailagic, Daniel P. Siewiorek, Uwe Maurer, A...
MSWIM
2005
ACM
14 years 2 months ago
Towards resilient geographic routing in WSNs
In this paper, we consider the security of geographical forwarding (GF) – a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their locati...
Nael B. Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu
PDC
2004
ACM
14 years 2 months ago
The weight of space: participatory design research for configuring habitable space for new arrival women in Hong Kong
When arriving to Hong Kong from China, the first difficulty of the new arrival women of the grassroots class is usually environmental stress. Their socio-economic situations often...
Jackie Yan-Chi Kwok