Learn More
A number of multi-hop, wireless, network programming systems have emerged for sensor network retasking but none of these systems support a cryptographically-strong, public-key-based system for source authentication and integrity verification. The traditional technique for authenticating a program binary, namely a digital signature of the program hash, is(More)
The problem with the grid is that it does not currently extend completely to devices, because these devices are not viewed as having sufficient capability to be both clients and services. We design, implement and evaluate Mobile OGSI.NET, which extends an implementation of grid computing, OGSI.NET, to mobile devices. Mobile OGSI.NET addresses the mobile(More)
INTRODUCTION Available assays for quantitation of the Alzheimer's disease (AD) biomarker amyloid-beta 1-42 (Aβ [1-42]) in cerebrospinal fluid demonstrate significant variability and lack of standardization to reference measurement procedures (RMPs). We report analytical performance data for the novel Elecsys β-amyloid (1-42) assay (Roche Diagnostics). (More)
For certain types of digitally generated holographic memories, it is important that the Fourier components to be stored have a constant, or nearly constant, modulus. It is shown that by interlacing two sequences of complex numbers, one a data sequence representing the information to be stored and the second a parity sequence, derivable from the data(More)
The compact, mobile device, such as the PocketPC, is often regarded as little more than a handy, smaller "portal" by which to access information kept on larger back-end machines such as exchange servers and WWW servers. However, the true value of the device may ultimately result from more sophisticated approaches by which the device can fully recognize and(More)