Sciweavers

704 search results - page 103 / 141
» Intrinsic References in Distributed Systems
Sort
View
IRREGULAR
1997
Springer
13 years 11 months ago
Programming with Shared Data Abstractions
ing with shared data abstractions Simon Dobson1 and Don Goodeve2 1 Well-Founded Systems Unit, CLRC Rutherford Appleton Laboratory, UK 2 School of Computer Studies, University of Le...
Simon A. Dobson, Don Goodeve
WISEC
2010
ACM
13 years 7 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
CHI
2011
ACM
12 years 11 months ago
"Now, i have a body": uses and social norms for mobile remote presence in the workplace
This article is a modified version of the paper published at CHI 2011 [11]. For more details about the study, please refer to the original paper. We report our study on mobile rem...
Min Kyung Lee, Leila Takayama
IACR
2011
129views more  IACR 2011»
12 years 7 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
INFOCOM
2012
IEEE
11 years 10 months ago
Coding and replication co-design for interactive multiview video streaming
—Multiview video refers to the simultaneous capturing of multiple video views with an array of closely spaced cameras. In an interactive multiview video streaming (IMVS) system, ...
Huan Huang, Bo Zhang, S.-H. Gary Chan, Gene Cheung...