Sciweavers

1656 search results - page 275 / 332
» Labeling Schemes with Queries
Sort
View
CSREAEEE
2006
120views Business» more  CSREAEEE 2006»
13 years 9 months ago
Object Caching Model for Cell Phone Mobile Database
- Inherent limitations of mobile computing environment such as limited bandwidth, limited resourced mobile phones, and instability of wireless environment require summarized mobile...
Khubaib Ahmed Qureshi
JCM
2008
138views more  JCM 2008»
13 years 7 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
JDWM
2008
97views more  JDWM 2008»
13 years 7 months ago
Seismological Data Warehousing and Mining: A Survey
Earthquake data composes an ever increasing collection of earth science information for post-processing analysis. Earth scientists, local or national administration officers and s...
Gerasimos Marketos, Yannis Theodoridis, Ioannis S....
TWC
2008
170views more  TWC 2008»
13 years 7 months ago
Secure and Serverless RFID Authentication and Search Protocols
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID proto...
Chiu Chiang Tan, Bo Sheng, Qun Li
DEBU
2002
116views more  DEBU 2002»
13 years 7 months ago
Indexing Mobile Objects Using Duality Transforms
We present techniques to index mobile objects in order to efficiently answer range queries about their future positions. This problem appears in real-life applications, such as pr...
Dimitris Papadopoulos, George Kollios, Dimitrios G...