Sciweavers

2310 search results - page 267 / 462
» Managing System and Active-Content Integrity
Sort
View
ESAS
2007
Springer
14 years 2 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
GROUP
2003
ACM
14 years 1 months ago
Communities of action: a cognitive and social approach to the design of CSCW systems
Most current theories about collective cognitive activities in limited groups apply to structurally closed co-operative situations Here we propose to work in the framework of inte...
Manuel Zacklad
DOA
2001
94views more  DOA 2001»
13 years 9 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
IVC
2006
171views more  IVC 2006»
13 years 8 months ago
Motion detection and tracking using belief indicators for an automatic visual-surveillance system
A motion detection and tracking algorithm for human and car activity surveillance is presented and evaluated by using the Pets'2000 test sequence. Proposed approach uses a te...
Cina Motamed
VMV
2003
135views Visualization» more  VMV 2003»
13 years 9 months ago
Derma: Monitoring the Evolution of Skin Lesions with a 3D System
We present a new integrated tool, DERMA, which allows to measure and assess the time evolution of chronic wounds. A laser triangulation 3D scanner is used to acquire the wound geo...
Marco Callieri, Paolo Cignoni, Paolo Pingi, Robert...