Sciweavers

1229 search results - page 151 / 246
» Trusted Computing
Sort
View
ICDCS
2008
IEEE
14 years 3 months ago
How to Monitor for Missing RFID tags
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and effic...
Chiu Chiang Tan, Bo Sheng, Qun Li
CSE
2009
IEEE
14 years 11 days ago
Socially Enhanced Network Address Translation
—The rapid evolution of the Internet has forced the use of Network Address Translation (NAT) to help slow the decline of publicly available IPv4 address space. While NAT provides...
Alexis Malozemoff, Muthucumaru Maheswaran
CHI
2004
ACM
14 years 9 months ago
Connecting with the absent presence: pervasive technology use and effects on community
This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Lisa Kleinman
CARDIS
2010
Springer
162views Hardware» more  CARDIS 2010»
14 years 12 days ago
On the Design and Implementation of an Efficient DAA Scheme
Abstract. Direct Anonymous Attestation (DAA) is an anonymous digital signature scheme that aims to provide both signer authentication and privacy. One of the properties that makes ...
Liqun Chen, Dan Page, Nigel P. Smart
CVPR
2006
IEEE
14 years 11 months ago
Successive Convex Matching for Action Detection
We propose human action detection based on a successive convex matching scheme. Human actions are represented as sequences of postures and specific actions are detected in video b...
Hao Jiang, Mark S. Drew, Ze-Nian Li