Sciweavers

13007 search results - page 2263 / 2602
» Wireless and Mobile Networking
Sort
View
PERCOM
2007
ACM
16 years 3 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
PERCOM
2007
ACM
16 years 3 months ago
Hoarding Context Information with Context Clusters
The components of a context-aware system can often become disconnected because of the dynamic environments within which they are deployed. Hoarding context information on the clie...
Myilone Anandarajah, Ricky Robinson, Jadwiga Indul...
PERCOM
2007
ACM
16 years 3 months ago
Facilitating RFID Development with the Accada Prototyping Platform
The proliferation of radiofrequency identification systems in application domains such as supply chain management requires an IT infrastructure that provides RFID device and data ...
Christian Floerkemeier, Matthias Lampe, Christof R...
PERCOM
2006
ACM
16 years 3 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
PERCOM
2006
ACM
16 years 3 months ago
Omero: Ubiquitous User Interfaces in the Plan B Operating System
It is difficult to build user interfaces that must be distributed over a set of dynamic and heterogeneous I/O devices. This difficulty increases when we want to split, merge, repl...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...
« Prev « First page 2263 / 2602 Last » Next »