Sciweavers

204 search results - page 31 / 41
» Environment Authentication Through 3D Structural Analysis
Sort
View
LADC
2007
Springer
14 years 2 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
INFOCOM
2006
IEEE
14 years 2 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang
HVEI
2009
13 years 6 months ago
Ecological optics of natural materials and light fields
The appearance of objects in scenes is determined by their shape, material properties and by the light field, and, in contradistinction, the appearance of those objects provides u...
Sylvia C. Pont
CASES
2007
ACM
14 years 18 days ago
Eliminating inter-process cache interference through cache reconfigurability for real-time and low-power embedded multi-tasking
We propose a technique which leverages configurable data caches to address the problem of cache interference in multitasking embedded systems. Data caches are often necessary to p...
Rakesh Reddy, Peter Petrov
IWC
2007
106views more  IWC 2007»
13 years 8 months ago
The role of social presence in establishing loyalty in e-Service environments
Compared to offline shopping, the online shopping experience may be viewed as lacking human warmth and sociability as it is more impersonal, anonymous, automated and generally dev...
Dianne Cyr, Khaled Hassanein, Milena M. Head, Alex...