Sciweavers

485 search results - page 76 / 97
» T-shift synchronization codes
Sort
View
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 3 months ago
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very b...
Mike Burmester, Breno de Medeiros
3DIM
2007
IEEE
14 years 3 months ago
Surround Structured Lighting for Full Object Scanning
This paper presents a new system for acquiring complete 3D surface models using a single structured light projector, a pair of planar mirrors, and one or more synchronized cameras...
Douglas Lanman, Daniel E. Crispell, Gabriel Taubin
FDL
2007
IEEE
14 years 3 months ago
Mapping Actor-Oriented Models to TLM Architectures
Actor-oriented modeling approaches are convenient for implementing functional models of embedded systems. Architectural models for heterogeneous system-on-chip architectures, howe...
Jens Gladigau, Christian Haubelt, Bernhard Niemann...
ACSAC
2006
IEEE
14 years 2 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
CLUSTER
2006
IEEE
14 years 2 months ago
JOSHUA: Symmetric Active/Active Replication for Highly Available HPC Job and Resource Management
Most of today‘s HPC systems employ a single head node for control, which represents a single point of failure as it interrupts an entire HPC system upon failure. Furthermore, it...
Kai Uhlemann, Christian Engelmann, Stephen L. Scot...