Sciweavers

804 search results - page 139 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
TCOM
2010
162views more  TCOM 2010»
14 years 11 months ago
RFID Reader Receivers for Physical Layer Collision Recovery
Abstract--Arbitration and scheduling of multiple tags in stateof-the-art Radio Frequency Identification (RFID) systems is accomplished on the medium access control layer. Currently...
Christoph Angerer, Robert Langwieser, Markus Rupp
PERVASIVE
2011
Springer
14 years 7 months ago
Designing Shared Public Display Networks - Implications from Today's Paper-Based Notice Areas
Large public displays have become a regular conceptual element in many shops and businesses, where they advertise products or highlight upcoming events. In our work, we are interes...
Florian Alt, Nemanja Memarovic, Ivan Elhart, Domin...
CORR
2012
Springer
205views Education» more  CORR 2012»
14 years 3 days ago
Check Your Data Freedom: A Taxonomy to Assess Life Science Database Openness
Molecular biology data are subject to terms of use that vary widely between databases and curating institutions. This research presents a taxonomy of contractual and technical res...
Mélanie Dulong de Rosnay
SBP
2012
Springer
13 years 12 months ago
Creating Interaction Environments: Defining a Two-Sided Market Model of the Development and Dominance of Platforms
Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
LFCS
2009
Springer
15 years 11 months ago
Completeness Results for Memory Logics
Memory logics are a family of modal logics in which standard relational structures are augmented with data structures and additional operations to modify and query these structure...
Carlos Areces, Santiago Figueira, Sergio Mera