Sciweavers

6137 search results - page 956 / 1228
» Securing Collaborative Applications
Sort
View
JTAER
2008
103views more  JTAER 2008»
15 years 2 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
139
Voted
PERVASIVE
2008
Springer
15 years 2 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...
109
Voted
CONCURRENCY
2004
93views more  CONCURRENCY 2004»
15 years 2 months ago
Studying protein folding on the Grid: experiences using CHARMM on NPACI resources under Legion
-- One of the benefits of a computational grid is the ability to run high-performance applications over distributed resources simply and securely. We demonstrated this benefit with...
Anand Natrajan, Michael Crowley, Nancy Wilkins-Die...
131
Voted
NGC
2007
Springer
120views Communications» more  NGC 2007»
15 years 2 months ago
End-to-End QoS Support for a Medical Grid Service Infrastructure
Quality of Service support is an important prerequisite for the adoption of Grid technologies for medical applications. The GEMSS Grid infrastructure addressed this issue by offer...
Siegfried Benkner, Gerhard Engelbrecht, Stuart E. ...
107
Voted
ICRA
2010
IEEE
154views Robotics» more  ICRA 2010»
15 years 1 months ago
Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator
— Soft robotic systems have applications in industrial, medical, and security applications. Many applications require these robots to be small and lightweight. One challenge in d...
Nadia Cheng, Genya Ishigami, Stephan Hawthorne, Ha...