Sciweavers

897 search results - page 16 / 180
» Security Requirements for RFID Computing Systems
Sort
View
WCNC
2008
IEEE
14 years 2 months ago
A Low Latency Scheme for Bulk RFID Tag Reading
—Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. These transmitted signals, or IDs, may collide if multiple tags transmit their I...
Erik F. Golen, Nirmala Shenoy, Xiaojun Cao
IPPS
2000
IEEE
14 years 11 days ago
A Requirements Analysis for Parallel KDD Systems
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
William Maniatty, Mohammed Javeed Zaki
JVA
2006
IEEE
14 years 2 months ago
Programming Models for Grid Applications and Systems: Requirements and Approaches
History repeats itself. Since the invention of the programmable computer, numerous computer scientists keep dedicating their professional lives to the design of “the single, bes...
Thilo Kielmann
CSFW
2010
IEEE
13 years 12 months ago
Required Information Release
Abstract—Many computer systems have a functional requirement to release information. Such requirements are an important part of a system’s information security requirements. Cu...
Stephen Chong
MHCI
2009
Springer
14 years 2 months ago
Industrial case study of the MICA support system for warehouse workers
Returns caused by the delivery of incorrect items constitute a major problem for non-automated warehouses. Returns not only create extra costs, they also aggravate customers. Most...
Christian Prause, Markus Eisenhauer, Lukas Gillman...