Sciweavers

44 search results - page 4 / 9
» soups 2009
Sort
View
SOUPS
2009
ACM
15 years 10 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
130
Voted
PERCOM
2009
ACM
15 years 10 months ago
A Letter Soup for the Quality of Information in Sensor Networks
—In this paper, an information grouping paradigm for QoI in sensor networks is introduced. First, a definition of QoI is presented by analyzing the ITU’s definition of QoS. T...
Chatschik Bisdikian, Joel W. Branch, Kin K. Leung,...
141
Voted
CVPR
2009
IEEE
16 years 11 months ago
Alphabet SOUP: A Framework for Approximate Energy Minimization
Many problems in computer vision can be modeled using conditional Markov random fields (CRF). Since finding the maximum a posteriori (MAP) solution in such models is NP-hard, mu...
Stephen Gould (Stanford University), Fernando Amat...
SOUPS
2009
ACM
15 years 10 months ago
Not one click for security?
: © Not One Click for Security Alan H. Karp, Marc Stiegler, Tyler Close HP Laboratories HPL-2009-53 Secure cooperation, usable security Conventional wisdom holds that security mus...
Alan H. Karp, Marc Stiegler, Tyler Close
SOUPS
2009
ACM
15 years 10 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs