Sciweavers

610 search results - page 92 / 122
» Predicate-Based Key Exchange
Sort
View
UCS
2007
Springer
14 years 1 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
ICMCS
2006
IEEE
170views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Bit-Stream Switching in Multiple Bit-Rate Video Streaming using Wyner-Ziv Coding
It has been commonly recognized that multiple bit-rate (MBR) encoding provides a concise method for video streaming over bandwidth-fluctuant networks. The key problem of the MBR t...
Wen Sun, Yan Lu, Feng Wu
ISCA
2006
IEEE
107views Hardware» more  ISCA 2006»
14 years 1 months ago
Distributed Arithmetic on a Quantum Multicomputer
We evaluate the performance of quantum arithmetic algorithms run on a distributed quantum computer (a quantum multicomputer). We vary the node capacity and I/O capabilities, and t...
Rodney Van Meter, Kae Nemoto, W. J. Munro, Kohei M...
LCN
2006
IEEE
14 years 1 months ago
Biologically-Inspired Adaptive Data Aggregation for Multi-Modal Wireless Sensor Networks
This paper describes BiSNET (Biologically-inspired architecture for Sensor NETworks), which addresses several key issues in multi-modal wireless sensor networks such as autonomy, ...
Pruet Boonma, Junichi Suzuki
DEEC
2005
IEEE
14 years 1 months ago
Practical Issues for Building a Product Ontology System
A base of clearly defined product information is a key foundation for an e-commerce system. The manipulation and exchange of semantically enriched and precise product information ...
Ig-hoon Lee, Suekyung Lee, Taehee Lee, Sang-goo Le...