Sciweavers

451 search results - page 66 / 91
» Goal-oriented Analysis of Regulations
Sort
View
144
Voted
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 10 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 10 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
WIOPT
2006
IEEE
15 years 10 months ago
A general probabilistic model for improving key assignment in wireless networks
Abstract— We study the problem of establishing secure communication channels in resource-constrained wireless networks using key predistribution. Pairwise communication channels ...
Patrick Tague, Radha Poovendran
135
Voted
ATAL
2005
Springer
15 years 9 months ago
Liberalizing protocols for argumentation in multi-agent systems
This publication summarizes research on the the design and implementation of liberalized version of existing truth-ïŹnding protocols for argumentation, such as the standard two-a...
Gerard Vreeswijk
EUROCAST
2005
Springer
182views Hardware» more  EUROCAST 2005»
15 years 9 months ago
Computer Vision Application: Real Time Smart Traffic Light
Abstract. The design, development, construction and testing of an ArtificialVision controlled Traffic-Light prototype has been carried out to rule and regulate intersections. Metho...
Ángel Serrano, Cristina Conde, Licesio J. R...