Sciweavers

209 search results - page 36 / 42
» Time Scaling of Chaotic Systems: Application to Secure Commu...
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...
COMCOM
2006
154views more  COMCOM 2006»
13 years 7 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
MOBIDE
2006
ACM
14 years 1 months ago
GPS-Free node localization in mobile wireless sensor networks
An important problem in mobile ad-hoc wireless sensor networks is the localization of individual nodes, i.e., each node’s awareness of its position relative to the network. In t...
Hüseyin Akcan, Vassil Kriakov, Hervé B...
ACSAC
2002
IEEE
14 years 19 days ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
WPES
2005
ACM
14 years 1 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer