Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
Unsolicited Commercial Communication also known as spam - has traditionally been the most visible e-mail threat and has reached a point where it creates a major problem for the de...
Evangelos Moustakas, C. Ranganathan, Penny Duqueno...
Human interaction proofs (HIPs) have become common place on the internet due to their effectiveness in deterring automated abuse of online services intended for humans. However, th...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
Abstract. The field of Remote Vehicle Diagnostics can be described as the remote management of vehicles equipped with electronic control systems. Despite the great potential that i...
Jonas Kuschel, Henrik Fagrell, Carl Johan Andersso...
As the Internet and enterprise wide distributed systems become more prevalent in business IT systems, numerous advanced COTS (commercial off-the-shelf) middleware technologies hav...