Learn More
—With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID protocols use a central database to store the RFID tag data. The RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database(More)
Plants must effectively defend against biotic and abiotic stresses to survive in nature. However, this defense is costly and is often accompanied by significant growth inhibition. How plants coordinate the fluctuating growth-defense dynamics is not well understood and remains a fundamental question. Jasmonate (JA) and gibberellic acid (GA) are important(More)
1. Serotonin (5-HT) facilitates the connections between sensory and motor neurons in Aplysia during behavioural sensitization. The effect of 5-HT on sensorimotor synapses is believed to be primarily presynaptic. Here we tested whether 5-HT can have an exclusively postsynaptic facilitatory effect. 2. Siphon motor neurons were individually dissociated from(More)
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which(More)
With the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection to users. Most recent RFID protocols use a central database to store the RFID tag data. An RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns(More)
We develop distributed algorithms for self-organizing sensor networks that respond to directing a target through a region. The sensor network models the danger levels sensed across its area and has the ability to adapt to changes. It represents the dangerous areas as obstacles. A protocol that combines the artificial potential field of the sensors with the(More)
—In a dynamic spectrum access (DSA) network, communication rendezvous is the first step for two secondary users to be able to communicate with each other. In this step, the pair of secondary users meet on the same channel, over which they negotiate on the communication parameters, to establish the communication link. This paper presents ETCH, Efficient(More)
We consider a sensor network that is not fully trusted and ask the question how we preserve privacy for the collected data and how we verify the data reply from the network. We explore the problem in the context of a network augmented with storage nodes and target at range query. We use bucketing scheme to mix the data for a range, use message encryption(More)