Sciweavers

160 search results - page 28 / 32
» Ubiquitous Electronic Tagging
Sort
View
CODES
2005
IEEE
14 years 3 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
GRAPHICSINTERFACE
2008
13 years 11 months ago
SurfaceFusion: unobtrusive tracking of everyday objects in tangible user interfaces
Interactive surfaces and related tangible user interfaces often involve everyday objects that are identified, tracked, and augmented with digital information. Traditional approach...
Alex Olwal, Andrew D. Wilson
BMCBI
2005
116views more  BMCBI 2005»
13 years 9 months ago
Which gene did you mean?
Computational Biology needs computer-readable information records. Increasingly, meta-analysed and pre-digested information is being used in the follow up of high throughput exper...
Barend Mons
GEOS
2007
Springer
14 years 4 months ago
Spatio-temporal Conceptual Schema Development for Wide-Area Sensor Networks
Abstract. A Wide-Area Sensor Network (WASN) is a collection of heterogeneous sensor networks and data repositories spread over a wide geographic area. The diversity of sensor types...
Mallikarjun Shankar, Alexandre Sorokine, Budhendra...
DAC
2004
ACM
14 years 10 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...