Sciweavers

4529 search results - page 881 / 906
» Position Based Cryptography
Sort
View
CN
2007
114views more  CN 2007»
13 years 11 months ago
BiSNET: A biologically-inspired middleware architecture for self-managing wireless sensor networks
This paper describes BiSNET (Biologically-inspired architecture for Sensor NETworks), a middleware architecture that addresses several key issues in multi-modal wireless sensor ne...
Pruet Boonma, Junichi Suzuki
IOR
2008
89views more  IOR 2008»
13 years 11 months ago
Impulse Control of Brownian Motion: The Constrained Average Cost Case
When a manufacturer places repeated orders with a supplier to meet changing production requirements, he faces the challenge of finding the right balance between holding costs and ...
Melda Ormeci, J. G. Dai, John H. Vande Vate
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
13 years 11 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
IJCV
2006
165views more  IJCV 2006»
13 years 11 months ago
A Riemannian Framework for Tensor Computing
Tensors are nowadays a common source of geometric information. In this paper, we propose to endow the tensor space with an affine-invariant Riemannian metric. We demonstrate that ...
Xavier Pennec, Pierre Fillard, Nicholas Ayache
IJVR
2006
142views more  IJVR 2006»
13 years 11 months ago
Garden Alive: an Emotionally Intelligent Interactive Garden
In this paper, we introduce the "Garden Alive" system that allows users to interact with an emotionally intelligent virtual garden by manipulating tangible user interface...
Taejin Ha, Woontack Woo