Sciweavers

794 search results - page 131 / 159
» Eye tracking in practice
Sort
View
MWCN
2004
Springer
14 years 3 months ago
A Simple Privacy Extension for Mobile IPV6
In Mobile IPv6, each packet sent and received by a mobile node contains its home address. As a result, it is very easy for an eavesdropper or for a correspondent node to track the ...
Claude Castelluccia, Francis Dupont, Gabriel Monte...
ICSM
2003
IEEE
14 years 3 months ago
An Environment for Managing Evolving Product Line Architectures
The use of product lines is recognized as beneficial in promoting and structuring both component and architecture reuse throughout an organization. While the business practices of...
Akash Garg, Matt Critchlow, Ping Chen, Christopher...
FC
2003
Springer
111views Cryptology» more  FC 2003»
14 years 3 months ago
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
Abstract. Thanks to their broad international acceptance and availability in high denominations, there is widespread concern that Euro banknotes may provide an attractive new curre...
Ari Juels, Ravikanth Pappu
CDC
2009
IEEE
120views Control Systems» more  CDC 2009»
14 years 2 months ago
Multivariable three-term optimal controller design for large-scale systems
— This paper deals with the design of controllers for large-scale linear time-invariant multi-input multi-output systems, such as those that often arise in process control. We fo...
Edward J. Davison, Daniel E. Davison, Simon Lam
EDBT
2009
ACM
135views Database» more  EDBT 2009»
14 years 2 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso