Sciweavers

516 search results - page 29 / 104
» Getting the Details Right
Sort
View
IJSN
2006
76views more  IJSN 2006»
13 years 7 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
MICCAI
2009
Springer
14 years 8 months ago
Using Real-Time fMRI to Control a Dynamical System by Brain Activity Classification
We present a method for controlling a dynamical system using real-time fMRI. The objective for the subject in the MR scanner is to balance an inverted pendulum by activating the le...
Anders Eklund, Henrik Ohlsson, Mats T. Andersson...
CHI
2008
ACM
14 years 8 months ago
Searching for expertise
It is well established that there is a need to find experts to get answers or advice. A variety of expertise locator tools have emerged to help locate the right person. But there ...
Kate Ehrlich, N. Sadat Shami
PERCOM
2008
ACM
14 years 7 months ago
CoWSAMI: Interface-aware context gathering in ambient intelligence environments
In this paper we present CoWSAMI, a middleware infrastructure that enables context awareness in open ambient intelligence environments, consisting of mobile users and context sour...
Dionysis Athanasopoulos, Apostolos Zarras, Valéri...
ASPLOS
2006
ACM
14 years 1 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie