Sciweavers

859 search results - page 112 / 172
» Security for Key Management Interfaces
Sort
View
DAGSTUHL
2007
13 years 11 months ago
Lifetime Extension of Higher Class UHF RFID Tags using special Power Management Techniques and Energy Harvesting Devices
Abstract. Enhanced RFID tag technology especially in the UHF frequency range provides extended functionality like high operating range and sensing and monitoring capabilities. Such...
Alex Janek, Christian Steger, Josef Preishuber-Pfl...
PPOPP
2003
ACM
14 years 3 months ago
Impala: a middleware system for managing autonomic, parallel sensor systems
Sensor networks are long-running computer systems with many sensing/compute nodes working to gather information about their environment, process and fuse that information, and in ...
Ting Liu, Margaret Martonosi
CCS
2009
ACM
14 years 10 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
SIGIR
1999
ACM
14 years 2 months ago
Content-Based Retrieval for Music Collections
A content-based retrieval model for tackling the mismatch problems specific to music data is proposed and implemented. The system uses a pitch profile encoding for queries in any ...
Yuen-Hsien Tseng
NOMS
2000
IEEE
131views Communications» more  NOMS 2000»
14 years 2 months ago
Provision of global number portability using CORBA
Global Number Portability (GNP) is becoming a key service to increase competition and profit of a service provider for the ever-growing telephone marketplace. In this paper, we pr...
Kyu-Hyung Kim, Dong-Hee Lee, Eun-Ju Ha, Jong-Tae P...