Sciweavers

350 search results - page 28 / 70
» Practices of stigmergy in architectural work
Sort
View
CONTEXT
2007
Springer
14 years 1 months ago
Multiuser Intelligent M-learning Environment
In this article we present the architecture of an m-learning (mobile-learning) environment using Bluetooth as communications technology. We also describe its practical implementati...
Angel Moreno, Melquiades Carbajo, Bonifacio Casta&...
SIMULATION
1998
83views more  SIMULATION 1998»
13 years 7 months ago
Libraries of Reusable Models: Theory and Application
Setting up a simulation model is more than writing down state equations and running them on a computer. A lot of conceptual information about the physics and engineering aspects o...
Arno Breunese, Jan L. Top, Jan F. Broenink, J. M. ...
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 1 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
JNW
2008
97views more  JNW 2008»
13 years 7 months ago
Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks
We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge bu...
Seung S. Yang, Yoon G. Kim, Hongsik Choi
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
13 years 8 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...