Sciweavers

2673 search results - page 495 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 6 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
EVOW
2001
Springer
14 years 9 days ago
Evolution of Spiking Neural Controllers for Autonomous Vision-Based Robots
Abstract. We describe a set of preliminary experiments to evolve spiking neural controllers for a vision-based mobile robot. All the evolutionary experiments are carried out on phy...
Dario Floreano, Claudio Mattiussi
DAC
2006
ACM
14 years 1 months ago
Circuits for energy harvesting sensor signal processing
duce system weight and volume, increase operating lifetime, The recent explosion in capability of embedded and portable decrease maintenance costs, and open new frontiers for inele...
Rajeevan Amirtharajah, Justin Wenck, Jamie Collier...
MIDDLEWARE
2004
Springer
14 years 1 months ago
Toward a standard ubiquitous computing framework
This paper surveys a variety of subsystems designed to be the building blocks from which sophisticated infrastructures for ubiquitous computing are assembled. Our experience shows...
Martin Modahl, Bikash Agarwalla, Gregory D. Abowd,...
INFOCOM
2007
IEEE
14 years 2 months ago
Analysis of the Reliability of a Nationwide Short Message Service
—SMS has been arguably the most popular wireless data service for cellular networks. Due to its ubiquitous availability and universal support by mobile handsets and cellular carr...
Xiaoqiao Meng, Petros Zerfos, Vidyut Samanta, Star...