A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
LacminCC: lightweight anonymous communication model in cloud computing
2021
EURASIP Journal on Wireless Communications and Networking
of system users and the security of messages in small groups. ...
Our analysis shows that, the proposed communication model cannot only reduce memory consumption and improve message transmission efficiency, but also effectively resist traffic-analysis attacks, node eavesdropping ...
FL designed and run the simulations. FL, XY, and ZW wrote the manuscript. FL, YW, and HJ proofread the manuscript. All authors read and approved the final manuscript. ...
doi:10.1186/s13638-021-01953-z
fatcat:avmspcfgofcjtovjpgablurwwa
Online Group-Exercises for Older Adults of Different Physical Abilities
2016
2016 International Conference on Collaboration Technologies and Systems (CTS)
In this paper we describe the design and validation of a virtual fitness environment aiming at keeping older adults physically and socially active. ...
The virtual fitness environment, namely Gymcentral, was designed to enable and motivate older adults to follow personalised exercises from home, with a (heterogeneous) group of remote friends and under ...
This work was also supported by the project "Evaluation and enhancement of social, economic and emotional wellbeing of older adults" under the agreement no. 14.Z50.310029, Tomsk Polytechnic University. ...
doi:10.1109/cts.2016.0098
dblp:conf/cts/BaezIFFC16
fatcat:wjokzfnzkzewdd467botbboz7q
Publics in practice
2011
Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11
In light of this, we designed, built, and deployed a ubiquitous computing system for one such overlooked group: the staff and residents at a shelter for homeless mothers. ...
We report on the adoption and use of this system over the course of a 30 week deployment, discussing the substantial impact our system had on shelter life and the broader implications for such socio-technical ...
ACKNOWLEDGEMENTS We thank IBM Research for their generous support of this project and Nokia for providing mobile phones. ...
doi:10.1145/1978942.1979189
dblp:conf/chi/DantecFCBEKE11
fatcat:4asb576tdzfu5io72iqz5uahyy
An Information Technology Tool to Support Negotiating Teams
1995
Australasian Journal of Information Systems
Emphasis is placed on the design features to enable and ease these interactions. ...
To this end, an information technology environment should be provided for the negotiation. The paper introduces SHINE, a collaborative software system developed at the University of Chile. ...
For instance, it can be specified that the system asks confirmation before sending a message. An adviser message may also be a video recording. ...
doi:10.3127/ajis.v2i2.401
fatcat:oe22tu4ca5cm5cnyqxbw76l7pi
Laocoön: Scalable and Portable Receipt-free E-voting Protocol without Untappable Channels
[article]
2019
arXiv
pre-print
With a policy of carrot and stick, it will encourage voters to deviate from honest voting strategy and spoil the democratic election. ...
Vote-buying and voter-coercion are the impending threats when deploying remote online voting into large scale elections. ...
At that date, administrator sends a message to bulletin board that separate the messages from different phases and inform candidates to publish their private key to bulletin board with their encoded identity ...
arXiv:1905.05562v1
fatcat:yy2lht2ikvc6pmam75o2n2osvu
Building a Private LoRaWAN Platform
2019
International Journal of Engineering and Advanced Technology
In this study, we implement a fully functional private independent LoRaWAN platform for the academic research of LPWAN Internet of Things (IoT) and demonstrate that our platform can support not only end-to-end ...
LoRaWAN communication but also graphical user interface on an embedded and limited computing power system. ...
However, for testing purpose, one can use un-encrypted packets. Fig. 8 shows the MQTT message at the application server side that is originated from the Marvin board. ...
doi:10.35940/ijeat.a1055.1291s319
fatcat:lxitceoghbczbcjb6lmv3bq5hi
Editorial for SM 160 – Design and Implementation of Mobile Smart Objects Special Issue
2016
Journal on spesial topics in mobile networks and applications
This system safeguards private property for all citizens, significantly enhances an existing vehicle recovery and anti-theft system, and improves the success rate for vehicle recovery. ...
It focuses on experiences with the design, implementation, deployment, operation and evaluation of novel communication approaches and systems for smart objects in the emerging cooperative environments. ...
This system safeguards private property for all citizens, significantly enhances an existing vehicle recovery and anti-theft system, and improves the success rate for vehicle recovery. ...
doi:10.1007/s11036-016-0720-x
fatcat:rrm3mjyyovhtjdonwv63flhvpy
Based Aspect-oriented Petri Nets in Software Engineering
2011
Physics Procedia
OOPN itself can process the software system design and development of effective control to ensure that the software system reliability and standardization. ...
Shows the method of using AO PN government office system software design and development of application examples, and gives some object class, the log section and the application form. ...
Introduction Petri method has been widely used C IM system design, analysis and implementation. It provides a complex manufacturing system on the effective analysis and implementation. ...
doi:10.1016/j.phpro.2011.11.100
fatcat:as4avxhfubavtguz7trqamjvfy
Soccer team based on agent-oriented programming
1997
Robotics and Autonomous Systems
In this paper the analysis, design and implementation of a soccer team of micro-robots is explained. ...
System Design framework. ...
However, these structures are expected to become real objects in the next versions as required for AOP. ...
doi:10.1016/s0921-8890(97)00024-9
fatcat:xvi4vke6gbgttaodaxypjywziy
Design of an Internet of Things System for Smart Hospitals
[article]
2022
arXiv
pre-print
As a result, an effective and secure Internet of things system is critical. This article proposes an IoT system that might be used in hospitals for a variety of purposes. ...
This system collects data by LoRa, Wi-Fi, and other ways, uploads it to a cloud platform for processing over a secure connection, and then feeds it back to users in real-time via the user interface. ...
Anyone with access to the public key can send an encrypted message to the private key holder, and only the private key holder can decrypt and read the message. ...
arXiv:2203.12787v2
fatcat:rrgz3mjbh5cpzgtl422dww3bia
A tale of two publics
2010
Proceedings of the 8th ACM Conference on Designing Interactive Systems - DIS '10
and coordinate for mutual good. ...
The CRM consists of three components: 1) a message center that pools messages to and from mobile users into a shared, persistent forum; 2) a text and voice messaging gateway linking the mobile phones of ...
We would also thank the shelter staff and residents for their participation, patience, and insight throughout the design process. This research was supported by the NSF under grant IIS-0915624. ...
doi:10.1145/1858171.1858174
dblp:conf/ACMdis/DantecCBFEDKE10
fatcat:kussf7s2erayrpnphi7vqxetu4
An Evenhanded Certified Email System for Contract Signing
[chapter]
2005
Lecture Notes in Computer Science
We point out that no traditional certified email systems have been designed for such a case, thus one of the participants can be at a disadvantage. ...
Certified email is a system which enables a sender to prove a receiver's receipt of email. Such a system can be used for applications related to electronic commerce on the Internet. ...
Next, the TTP checks whether valid Response message has been posted on the bulletin board or not, and if it is published, the TTP decrypts S2T with its private key, and publishes K included in it. ...
doi:10.1007/11602897_1
fatcat:6o522foeyvfmres3jiay4xxuim
Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions
2014
Information Technology and Control
of short message and long message. ...
apply the proposed schemes to the online proxy auction system for comparing two authorized online proxy auction policies (agents anonymity setting and agents accountability setting) with different applications ...
This work was supported in part by the Chang Gung University Grant CMRPD3D0041 and in part by National Science Council under the grant NARPD3D0071. ...
doi:10.5755/j01.itc.43.4.6348
fatcat:ui372o7jabaizf3o62zdk5ylly
Prototypes of Using Directional Antenna for Railroad Crossing Safety Applications
[article]
2018
arXiv
pre-print
We will demonstrate the feasibility and advantages of our proposed system, including the antenna design, system deployment, the over-the-air transmission, and the software applications that we developed ...
for the end users. ...
For the data analysis of the warning messages, we develop visualization tool that can display the data transmission performance for both OBU and RSU. ...
arXiv:1901.05285v1
fatcat:44radl4tpjfp3k33evpezalzii
IOV Privacy Protection System Based on Double-Layered Chains
2019
Wireless Communications and Mobile Computing
) is designed to bring safety and zero-knowledge property to the system; finally, we give the application scenario of this IOV privacy protection system based on double-layered chain that it can be widely ...
Specifically, an IOV double-layered chain model is constructed to simulate a semicentralized system that is convenient for government to supervise; also, a RSA protocol based on zero-knowledge proof (ZKP ...
Acknowledgments This research is supported by the National Key Research and Development Program of China (no. 2017YFB0802500).
Wireless Communications and Mobile Computing ...
doi:10.1155/2019/3013562
fatcat:u2qcxiqndndubo43av54rz4coa
« Previous
Showing results 1 — 15 out of 128,092 results