You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: “There must exist better solutions. ” I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ̈ , whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions fo...
The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore, from 9 May 2005 till 12 May 2005, represents the ?ne collection of 540 refereed papers selected from nearly 2,700 submissions. Computational Science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size ...
nd Welcome to the proceedings of PERVASIVE 2004, the 2 International C- ference on Pervasive Computing and the premier forum for the presentation and appraisal of the most recent and most advanced research results in all - undational and applied areas of pervasive and ubiquitous computing. Consi- ring the half-life period of technologies and knowledge this community is facing, PERVASIVE is one of the most vibrant, dynamic, and evolutionary among the computer-science-related symposia and conferences. The research challenges, e?orts, and contributions in pervasive computing have experienced a breathtaking acceleration over the past couple of years, mostly due to technological progress, growth,...
Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing in Seoul, Korea, August 2006. The book presents 102 revised papers spanning six workshops: network-centric ubiquitous systems (NCUS 2006), security in ubiquitous computing systems (SecUbiq 2006), RFID and ubiquitous sensor networks (USN 2006), trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2006), embedded software optimization (ESO 2006), and multimedia solution and assurance in ubiquitous information systems (MSA 2006).
Welcome to the proceedings of the 2005 IFIP International Conference on - bedded and Ubiquitous Computing (EUC 2005), which was held in Nagasaki, Japan, December 6–9, 2005. Embedded and ubiquitous computing is emerging rapidly as an exciting new paradigm to provide computing and communication services all the time, - erywhere. Its systems are now pervading every aspect of life to the point that they are hidden inside various appliances or can be worn unobtrusively as part of clothing and jewelry. This emergence is a natural outcome of research and technological advances in embedded systems, pervasive computing and c- munications, wireless networks, mobile computing, distributed computing a...
The International conference on Personal Wireless Communications (PWC 2007) was the twelfth conference of its series aimed at stimulating technical exchange between researchers, practitioners and students interested in mobile computing and wireless networks. The program covered a variety of research topics that are of current interest, including Ad-Hoc Networks, WiMAX, Heterogeneous Networks, Wireless Networking, QoS and Security, Sensor Networks, Multicast and Signal processing.
The book generously covers a wide range of aspects and issues related to RFID systems, namely the design of RFID antennas, RFID readers and the variety of tags (e.g. UHF tags for sensing applications, surface acoustic wave RFID tags, smart RFID tags), complex RFID systems, security and privacy issues in RFID applications, as well as the selection of encryption algorithms. The book offers new insights, solutions and ideas for the design of efficient RFID architectures and applications. While not pretending to be comprehensive, its wide coverage may be appropriate not only for RFID novices but also for experienced technical professionals and RFID aficionados.
Das erfolgreiche Internet basiert auf einer großen Anzahl unterschiedlicher Kommunikationsprotokolle. Diese erfüllen wesentliche Aufgaben, wie Adressierung, Datentransport oder sichere Kommunikation. Wählt man die richtigen Protokolle aus, so können gewünschte Eigenschaften der Kommunikation erreicht werden. Die vorliegende Arbeit betrachtet die automatisierte Wahl von Kommunikationsprotokollen und die damit erreichbare Verbesserung von zum Beispiel Sicherheit.