Sciweavers

11097 search results - page 2081 / 2220
» Hera presentation generator
Sort
View
RAID
2005
Springer
14 years 2 months ago
Virtual Playgrounds for Worm Behavior Investigation
To detect and defend against Internet worms, researchers have long hoped to have a safe convenient environment to unleash and run real-world worms for close observation of their in...
Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H....
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
SCOPES
2005
Springer
14 years 2 months ago
Software Synthesis from the Dataflow Interchange Format
Specification, validation, and synthesis are important aspects of embedded systems design. The use of dataflow-based design environments for these purposes is becoming increasingl...
Chia-Jui Hsu, Shuvra S. Bhattacharyya
UML
2005
Springer
14 years 2 months ago
Using Process Algebra to Validate Behavioral Aspects of Object-Oriented Models
We present in this paper a rigorous and automated based approach for the behavioral validation of control software systems. This approach relies on metamodeling, model-transformati...
Alban Rasse, Jean-Marc Perronne, Pierre-Alain Mull...
VLDB
2005
ACM
96views Database» more  VLDB 2005»
14 years 2 months ago
Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype
Radio Frequency Identification (RFID) based item-level tracking holds the promise of revolutionizing supply-chain, retail store, and asset management applications. However, the hi...
Ying Hu, Seema Sundara, Timothy Chorma, Jagannatha...
« Prev « First page 2081 / 2220 Last » Next »