Sciweavers

5376 search results - page 958 / 1076
» Scalable Kernel Systems
Sort
View
TC
2008
15 years 4 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
TCS
2008
15 years 4 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
IS
2007
15 years 4 months ago
Matching large schemas: Approaches and evaluation
Current schema matching approaches still have to improve for large and complex Schemas. The large search space increases the likelihood for false matches as well as execution time...
Hong Hai Do, Erhard Rahm
135
Voted
CG
2005
Springer
15 years 4 months ago
Realistic synthesis of cao shu of Chinese calligraphy
In Chinese calligraphy cao shu is regarded as a kind of free form art which differs from other styles greatly in its less constrained strokes and brush textures. In this paper we ...
Jinhui Yu, Qunsheng Peng
165
Voted
AAMAS
2004
Springer
15 years 4 months ago
MARP: A Multi-Agent Routing Protocol for Mobile Wireless Ad Hoc Networks
ACT Supporting mobility in a multi hop wireless environment like the MANET still remains a point of research, especially in the context of time-constrained applications. The incapa...
Romit Roy Choudhury, Krishna Paul, Somprakash Band...