Sciweavers

6137 search results - page 1053 / 1228
» Securing Collaborative Applications
Sort
View
IJIPT
2007
91views more  IJIPT 2007»
13 years 10 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins
JMM2
2007
122views more  JMM2 2007»
13 years 10 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma
VLC
2008
146views more  VLC 2008»
13 years 10 months ago
Interactive visual analysis of geographic data on mobile devices based on dynamic queries
The capabilities of current mobile devices, especially PDAs, are making it possible to design and develop mobile applications that employ visual techniques for using geographic da...
Stefano Burigat, Luca Chittaro
CCR
2000
101views more  CCR 2000»
13 years 10 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
ECR
2002
160views more  ECR 2002»
13 years 10 months ago
A New Micro-Payment System Using General Payword Chain
In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Therefore, a secure and efficient payment system for general-purpose applic...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
« Prev « First page 1053 / 1228 Last » Next »