128,092 Hits in 4.5 sec

LacminCC: lightweight anonymous communication model in cloud computing

Fengyin Li, Yanli Wang, Hongwei Ju, Xinying Yu, Zhaojie Wang, Huiyu Zhou
2021 EURASIP Journal on Wireless Communications and Networking  
of system users and the security of messages in small groups.  ...  Our analysis shows that, the proposed communication model cannot only reduce memory consumption and improve message transmission efficiency, but also effectively resist traffic-analysis attacks, node eavesdropping  ...  FL designed and run the simulations. FL, XY, and ZW wrote the manuscript. FL, YW, and HJ proofread the manuscript. All authors read and approved the final manuscript.  ... 
doi:10.1186/s13638-021-01953-z fatcat:avmspcfgofcjtovjpgablurwwa

Online Group-Exercises for Older Adults of Different Physical Abilities

Marcos Baez, Francisco Ibarra, Iman Khaghani Far, Michela Ferron, Fabio Casati
2016 2016 International Conference on Collaboration Technologies and Systems (CTS)  
In this paper we describe the design and validation of a virtual fitness environment aiming at keeping older adults physically and socially active.  ...  The virtual fitness environment, namely Gymcentral, was designed to enable and motivate older adults to follow personalised exercises from home, with a (heterogeneous) group of remote friends and under  ...  This work was also supported by the project "Evaluation and enhancement of social, economic and emotional wellbeing of older adults" under the agreement no. 14.Z50.310029, Tomsk Polytechnic University.  ... 
doi:10.1109/cts.2016.0098 dblp:conf/cts/BaezIFFC16 fatcat:wjokzfnzkzewdd467botbboz7q

Publics in practice

Christopher A. Le Dantec, Robert G. Farrell, Jim E. Christensen, Mark Bailey, Jason B. Ellis, Wendy A. Kellogg, W. Keith Edwards
2011 Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11  
In light of this, we designed, built, and deployed a ubiquitous computing system for one such overlooked group: the staff and residents at a shelter for homeless mothers.  ...  We report on the adoption and use of this system over the course of a 30 week deployment, discussing the substantial impact our system had on shelter life and the broader implications for such socio-technical  ...  ACKNOWLEDGEMENTS We thank IBM Research for their generous support of this project and Nokia for providing mobile phones.  ... 
doi:10.1145/1978942.1979189 dblp:conf/chi/DantecFCBEKE11 fatcat:4asb576tdzfu5io72iqz5uahyy

An Information Technology Tool to Support Negotiating Teams

Jose Montanana
1995 Australasian Journal of Information Systems  
Emphasis is placed on the design features to enable and ease these interactions.  ...  To this end, an information technology environment should be provided for the negotiation. The paper introduces SHINE, a collaborative software system developed at the University of Chile.  ...  For instance, it can be specified that the system asks confirmation before sending a message. An adviser message may also be a video recording.  ... 
doi:10.3127/ajis.v2i2.401 fatcat:oe22tu4ca5cm5cnyqxbw76l7pi

Laocoön: Scalable and Portable Receipt-free E-voting Protocol without Untappable Channels [article]

Shufan Zhang, Hu Xiong
2019 arXiv   pre-print
With a policy of carrot and stick, it will encourage voters to deviate from honest voting strategy and spoil the democratic election.  ...  Vote-buying and voter-coercion are the impending threats when deploying remote online voting into large scale elections.  ...  At that date, administrator sends a message to bulletin board that separate the messages from different phases and inform candidates to publish their private key to bulletin board with their encoded identity  ... 
arXiv:1905.05562v1 fatcat:yy2lht2ikvc6pmam75o2n2osvu

Building a Private LoRaWAN Platform

2019 International Journal of Engineering and Advanced Technology  
In this study, we implement a fully functional private independent LoRaWAN platform for the academic research of LPWAN Internet of Things (IoT) and demonstrate that our platform can support not only end-to-end  ...  LoRaWAN communication but also graphical user interface on an embedded and limited computing power system.  ...  However, for testing purpose, one can use un-encrypted packets. Fig. 8 shows the MQTT message at the application server side that is originated from the Marvin board.  ... 
doi:10.35940/ijeat.a1055.1291s319 fatcat:lxitceoghbczbcjb6lmv3bq5hi

Editorial for SM 160 – Design and Implementation of Mobile Smart Objects Special Issue

Pietro Manzoni, Claudio Palazzi
2016 Journal on spesial topics in mobile networks and applications  
This system safeguards private property for all citizens, significantly enhances an existing vehicle recovery and anti-theft system, and improves the success rate for vehicle recovery.  ...  It focuses on experiences with the design, implementation, deployment, operation and evaluation of novel communication approaches and systems for smart objects in the emerging cooperative environments.  ...  This system safeguards private property for all citizens, significantly enhances an existing vehicle recovery and anti-theft system, and improves the success rate for vehicle recovery.  ... 
doi:10.1007/s11036-016-0720-x fatcat:rrm3mjyyovhtjdonwv63flhvpy

Based Aspect-oriented Petri Nets in Software Engineering

Wensong Hu, Xingui Yang, Ke Zuo
2011 Physics Procedia  
OOPN itself can process the software system design and development of effective control to ensure that the software system reliability and standardization.  ...  Shows the method of using AO PN government office system software design and development of application examples, and gives some object class, the log section and the application form.  ...  Introduction Petri method has been widely used C IM system design, analysis and implementation. It provides a complex manufacturing system on the effective analysis and implementation.  ... 
doi:10.1016/j.phpro.2011.11.100 fatcat:as4avxhfubavtguz7trqamjvfy

Soccer team based on agent-oriented programming

J.Ll. de la Rosa, A. Oller, J. Vehí, J. Puyol
1997 Robotics and Autonomous Systems  
In this paper the analysis, design and implementation of a soccer team of micro-robots is explained.  ...  System Design framework.  ...  However, these structures are expected to become real objects in the next versions as required for AOP.  ... 
doi:10.1016/s0921-8890(97)00024-9 fatcat:xvi4vke6gbgttaodaxypjywziy

Design of an Internet of Things System for Smart Hospitals [article]

Jichao Leng, Xucun Yan, Zihuai Lin
2022 arXiv   pre-print
As a result, an effective and secure Internet of things system is critical. This article proposes an IoT system that might be used in hospitals for a variety of purposes.  ...  This system collects data by LoRa, Wi-Fi, and other ways, uploads it to a cloud platform for processing over a secure connection, and then feeds it back to users in real-time via the user interface.  ...  Anyone with access to the public key can send an encrypted message to the private key holder, and only the private key holder can decrypt and read the message.  ... 
arXiv:2203.12787v2 fatcat:rrgz3mjbh5cpzgtl422dww3bia

A tale of two publics

Christopher A. Le Dantec, Jim E. Christensen, Mark Bailey, Robert G. Farrell, Jason B. Ellis, Catalina M. Danis, Wendy A. Kellogg, W. Keith Edwards
2010 Proceedings of the 8th ACM Conference on Designing Interactive Systems - DIS '10  
and coordinate for mutual good.  ...  The CRM consists of three components: 1) a message center that pools messages to and from mobile users into a shared, persistent forum; 2) a text and voice messaging gateway linking the mobile phones of  ...  We would also thank the shelter staff and residents for their participation, patience, and insight throughout the design process. This research was supported by the NSF under grant IIS-0915624.  ... 
doi:10.1145/1858171.1858174 dblp:conf/ACMdis/DantecCBFEDKE10 fatcat:kussf7s2erayrpnphi7vqxetu4

An Evenhanded Certified Email System for Contract Signing [chapter]

Kenji Imamoto, Jianying Zhou, Kouichi Sakurai
2005 Lecture Notes in Computer Science  
We point out that no traditional certified email systems have been designed for such a case, thus one of the participants can be at a disadvantage.  ...  Certified email is a system which enables a sender to prove a receiver's receipt of email. Such a system can be used for applications related to electronic commerce on the Internet.  ...  Next, the TTP checks whether valid Response message has been posted on the bulletin board or not, and if it is published, the TTP decrypts S2T with its private key, and publishes K included in it.  ... 
doi:10.1007/11602897_1 fatcat:6o522foeyvfmres3jiay4xxuim

Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions

C. -L. Hsu, Y. -H. Chuang, P. -L. Tsai, A. Almari, S. M. Mizanur Rahman
2014 Information Technology and Control  
of short message and long message.  ...  apply the proposed schemes to the online proxy auction system for comparing two authorized online proxy auction policies (agents anonymity setting and agents accountability setting) with different applications  ...  This work was supported in part by the Chang Gung University Grant CMRPD3D0041 and in part by National Science Council under the grant NARPD3D0071.  ... 
doi:10.5755/j01.itc.43.4.6348 fatcat:ui372o7jabaizf3o62zdk5ylly

Prototypes of Using Directional Antenna for Railroad Crossing Safety Applications [article]

Xiaofu Ma, Sayantan Guha, Junsung Choi, Christopher R. Anderson, Randall Nealy, Jared Withers, Jeffrey H. Reed, Carl Dietrich
2018 arXiv   pre-print
We will demonstrate the feasibility and advantages of our proposed system, including the antenna design, system deployment, the over-the-air transmission, and the software applications that we developed  ...  for the end users.  ...  For the data analysis of the warning messages, we develop visualization tool that can display the data transmission performance for both OBU and RSU.  ... 
arXiv:1901.05285v1 fatcat:44radl4tpjfp3k33evpezalzii

IOV Privacy Protection System Based on Double-Layered Chains

Yin Ru Chen, Jin Rui Sha, Zhi Hong Zhou
2019 Wireless Communications and Mobile Computing  
) is designed to bring safety and zero-knowledge property to the system; finally, we give the application scenario of this IOV privacy protection system based on double-layered chain that it can be widely  ...  Specifically, an IOV double-layered chain model is constructed to simulate a semicentralized system that is convenient for government to supervise; also, a RSA protocol based on zero-knowledge proof (ZKP  ...  Acknowledgments This research is supported by the National Key Research and Development Program of China (no. 2017YFB0802500). Wireless Communications and Mobile Computing  ... 
doi:10.1155/2019/3013562 fatcat:u2qcxiqndndubo43av54rz4coa
« Previous Showing results 1 — 15 out of 128,092 results