Sciweavers

2517 search results - page 298 / 504
» Secure Deployment of Components
Sort
View
SMC
2010
IEEE
159views Control Systems» more  SMC 2010»
13 years 8 months ago
Mobile interaction with smart environments through linked data
This paper presents the design and architecture of an integrated environment that provides location independent and mobile access to Intelligent Domotic Environments. The envision...
Faisal Razzak, Dario Bonino, Fulvio Corno
DAC
2011
ACM
12 years 9 months ago
EFFEX: an embedded processor for computer vision based feature extraction
The deployment of computer vision algorithms in mobile applications is growing at a rapid pace. A primary component of the computer vision software pipeline is feature extraction,...
Jason Clemons, Andrew Jones, Robert Perricone, Sil...
PERCOM
2007
ACM
14 years 9 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
IEEEARES
2009
IEEE
14 years 4 months ago
Accuracy: The Fundamental Requirement for Voting Systems
—There have been several attempts to develop a comprehensive account of the requirements for voting systems, particularly for public elections. Typically, these approaches identi...
Tim Storer, Russell Lock
ESORICS
2009
Springer
14 years 4 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...