Filters








37 Hits in 2.5 sec

pBMDS

Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu
2010 Proceedings of the third ACM conference on Wireless network security - WiSec '10  
Through extensive experiments on major smartphone platforms, we show that pBMDS can be easily deployed to existing smartphone hardware and it achieves high detection accuracy and low false positive rates  ...  phone applications and the operating users on input and output constrained devices, and leverages a Hidden Markov Model (HMM) to learn application and user behaviors from two major aspects: process state  ...  Popularity of mobile services (e.g., email, messaging) and their dependence on common software platforms such as Symbian, Windows Mobile, and Linux, have made mobile devices ever more vulnerable.  ... 
doi:10.1145/1741866.1741874 dblp:conf/wisec/XieZSZ10 fatcat:5etf4ufncfchhpznrfgzgui2lu

Editorial: Mobile (March 2010)

Thomas Kunz, Dru Lavigne, François Lefebvre
2010 Technology Innovation Management Review  
, the handheld device hardware, and often the applications installed on those devices.  ...  This trend is not just confined to the mobile devices as there are also efforts in the development of open mobile infrastructure elements and whole systems.  ...  The main thrust is to facilitate the development of innovative next-generation mobile applications on resource-constraint, hand-held devices, exploring the required network architectures, network protocols  ... 
doaj:003b8b4334534fc38f73eb7c4c39db7e fatcat:lnwy6sbpqjeutkyou3otjdljga

RFID security and privacy: a research survey

A. Juels
2006 IEEE Journal on Selected Areas in Communications  
RFID tags are small, wireless devices that help identify objects and people.  ...  This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID).  ...  Weis for their comments on and suggestions for this work.  ... 
doi:10.1109/jsac.2005.861395 fatcat:rv6e4c26lbhsjfs5kthw7tpvvy

The PALIO Framework for Adaptive Information Services [chapter]

Constantine Stephanidis, Alexandros Paramythis, Vasilios Zarikas, Anthony Savidis
2005 Multiple User Interfaces  
mobile ones.  ...  One important aspect of the PALIO system is the support for a wide range of communication technologies (mobile or wired) to facilitate access to services.  ...  However, they are all intended for deployment on similar, resource-constrained devices.  ... 
doi:10.1002/0470091703.ch5 fatcat:anaj33ntzvf4zhqmxbpl45g4sq

SWL

Jihyun In, Ilhoon Shin, Hyojun Kim
2007 Proceedings of the 2007 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools - LCTES '07  
However, demand paging causes unpredictably long page fault latency, and as such mobile phone manufacturers are reluctant to deploy this scheme.  ...  Consequently, mobile phones require more hardware resources such as NOR/NAND flash memory and DRAM, and their production cost is accordingly becoming higher.  ...  We implemented the page fault handler on a Nucleus operating system [9] and ported it in a commercial target platform, TI OMAP 5912 OSK [10] .  ... 
doi:10.1145/1254766.1254806 dblp:conf/lctrts/InSK07 fatcat:bnkfspcmmfgfpgjphihq3nbazy

SWL

Jihyun In, Ilhoon Shin, Hyojun Kim
2007 SIGPLAN notices  
However, demand paging causes unpredictably long page fault latency, and as such mobile phone manufacturers are reluctant to deploy this scheme.  ...  Consequently, mobile phones require more hardware resources such as NOR/NAND flash memory and DRAM, and their production cost is accordingly becoming higher.  ...  We implemented the page fault handler on a Nucleus operating system [9] and ported it in a commercial target platform, TI OMAP 5912 OSK [10] .  ... 
doi:10.1145/1273444.1254806 fatcat:77krln3bxzb5lmpburvpuq6cue

Online/Offline Provable Data Possession

Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang, Willy Susilo
2017 IEEE Transactions on Information Forensics and Security  
the user to perform expensive computations, such as modular exponentiations for processing data before outsourcing to the storage server, which is not desirable for weak users with limited computation resources  ...  Thus, the expensive computations in PDP-related schemes will limit their wide usage especially for weak users, for example, on low-power devices such as wireless sensors (collecting data), smart phones  ...  The experimental analysis further confirms that our OOPDP instantiations provide perfect user experience for outsourcing data and are affordable by weak users, e.g., mobile devices with power supplies.  ... 
doi:10.1109/tifs.2017.2656461 fatcat:yfbi3kip6begxceqtr5jntki2a

A Policy Enforcing Mechanism for Trusted Ad Hoc Networks

Gang Xu, C Borcea, L Iftode
2011 IEEE Transactions on Dependable and Secure Computing  
In the near future, it will also be installed on smaller mobile devices such as PDAs and mobile phones [17] , which makes our TPM-based approach feasible for MANETs.  ...  Shamon enforces communication policies at the virtual machine level and requires that each node runs multiple virtual machines (one for each application), which may not be practical for mobile devices.  ...  The overall communication overhead over long network paths increases but still remains at low levels: less than 10% in networks with infrequent connectivity loss and about 20% in high-mobility networks  ... 
doi:10.1109/tdsc.2010.11 fatcat:mhfacomxtbhdpfpin66wzo5ooa

A distributed architecture for scalable private RFID tag identification

Agusti Solanas, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Vanesa Daza
2007 Computer Networks  
This paper focuses on combining tag privacy and scalability using the hash locks mechanism.  ...  Privacy When the RFID technology was initially deployed, the population of tags was quite small.  ...  Nowadays, the cost of RFID components is decreasing and their low prices have opened a broad range of possibilities involving mass deployment of tags.  ... 
doi:10.1016/j.comnet.2007.01.012 fatcat:zekblxzpxbgszdg5o4gqehozli

Coastal oceanography and sedimentology in New Zealand, 1967–91

Terry M. Hume, Robert G. Bell, Willem P. de Lange, Terry R. Healy, D. Murray Hicks, R. M. Kirk
1992 New Zealand Journal of Marine and Freshwater Research  
This paper reviews research that has taken place on physical oceanography and sedimentology on New Zealand's estuaries and the inner shelf since c. 1967.  ...  Hastie (1985) deployed an OSK 3239 Direct Wave Height Recorder for 1 year 2.5 km offshore from Timaru.  ...  is moved on the shelf in water depths out to 25 m depth, and that thus the shelf is considerably mobile overall.  ... 
doi:10.1080/00288330.1992.9516497 fatcat:nmckh524xjgv7c6zuhyasz6fau

Component-based active network architecture

S. Schmid, J. Finney, A.C. Scott, W.D. Shepherd
Proceedings. Sixth IEEE Symposium on Computers and Communications  
The documented research has been carried out at Lancaster University as part of the Land-MARC project [Lan01] and the Mobile-IPv6 Systems Research Lab [MSR01].  ...  Joe Finney for their constructive discussions and invaluable comments on my work.  ...  One of the key research questions, for example, is to what extent low-performance mobile devices, which typically lack processing and bandwidth resources, can benefit from off-loading computationally expensive  ... 
doi:10.1109/iscc.2001.935363 dblp:conf/iscc/SchmidFSS01 fatcat:7zob4pjy2jeptpeazescazjp3u

A Family of Dunces: Trivial RFID Identification and Authentication Protocols [chapter]

Gene Tsudik
Privacy Enhancing Technologies  
Proposed protocols involve minimal interaction between a tag and a reader and place very low computational burden on the tag. Notably, they also impose low computational load on back-end servers.  ...  Acknowledgements Many thanks to Stephan Engberg, David Molnar, Ari Juels, Xiaowei Yang and Einar Mykletun for helpful input on early versions of this paper.  ...  All this translates into needing more resources on the tag.  ... 
doi:10.1007/978-3-540-75551-7_4 dblp:conf/pet/Tsudik07 fatcat:6ocub2oatvhp3p5376qr4pn7qe

2. Global Problems, Complexity, and Civil Society in East Asia [chapter]

Peter Hayes, Richard Tanter
2015 Complexity, Security and Civil Society in East Asia  
reliance on external resources.  ...  As Bar-Yam argues, "In a high complexity environment, high complexity forces are more capable than low complexity ones.  ... 
doi:10.11647/obp.0059.02 fatcat:qruzjhgpbvdlllck2zvjtn3fyq

YA-SRAP: yet another serverless RFID authentication protocol

S.I. Ahamed, E. Hoque, F. Rahman, F. Kawsar, T. Nakajima
2008 4th International Conference on Intelligent Environments (IE 08)   unpublished
On the other hand ensuring flexible privacy mechanism has been an enormous challenge due to extremely inadequate computational storage of typical RFID tags.  ...  On the contrary, the tag will contain only one seed for its only one authorized reader . While deploying the tag by , will get , as from . stores in its nonvolatile memory.  ...  Another lightweight protocol is OSK [7] .  ... 
doi:10.1049/cp:20081141 fatcat:z75gkxv6tzaldjnjjj7mhz7pzi

Russia's Foray into Asia's Energy Market [chapter]

Morena Skalamera
2021 Russian Energy Strategy in the Asia-Pacific: Implications for Australia  
Due to resource nationalism and low trust, Russia was not excited to share the domestic pie.  ...  The Japanese shipbuilding company with the greatest involvement in the Yamal LNG project is Mitsui OSK Lines (MOL).  ... 
doi:10.22459/resap.2021.02 fatcat:iveoff6s7ndifca2qt4bawng6q
« Previous Showing results 1 — 15 out of 37 results