Sciweavers

521 search results - page 94 / 105
» Object location in realistic networks
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
EUROSSC
2007
Springer
14 years 3 months ago
Recognition of User Activity Sequences Using Distributed Event Detection
We describe and evaluate a distributed architecture for the online recognition of user activity sequences. In a lower layer, simple heterogeneous atomic activities were recognised ...
Oliver Amft, Clemens Lombriser, Thomas Stiefmeier,...
PAM
2007
Springer
14 years 3 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
ICDCSW
2006
IEEE
14 years 3 months ago
Wearable Computer for Ubiquitous Informal Communication
The rapid progress of information technology has spurred development of various communication support systems. In particular, the importance of informal communication has lately d...
Shun'ichi Tano, Tatsuhiro Takayama, Mitsuru Iwata,...
ICRA
2006
IEEE
111views Robotics» more  ICRA 2006»
14 years 3 months ago
Placement and Distributed Deployment of Sensor Teams for Triangulation based Localization
— We address the problem of placing a sensor network so as to minimize the uncertainty in estimating the position of targets. The novelty of our formulation is in the sensing mod...
Volkan Isler