Sciweavers

23 search results - page 3 / 5
» isict 2003
Sort
View
ISICT
2003
13 years 7 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
ISICT
2003
13 years 7 months ago
A new approach for distributed computing in avionics systems
Historically, a typical avionics system architecture has been designed as a federated architecture of black-boxes with well-defined functions and implemented on fully dedicated co...
Miguel A. Sánchez-Puebla, Jesús Carr...
ISICT
2003
13 years 7 months ago
An evolutionary approach for reducing the energy in address buses
In this paper we present a genetic approach for the efficient generation of an encoder to minimize switching activity on the high-capacity lines of a communication bus. The appro...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
ISICT
2003
13 years 7 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
ISICT
2003
13 years 7 months ago
Spam filters: bayes vs. chi-squared; letters vs. words
We compare two statistical methods for identifying spam or junk electronic mail. Spam filters are classifiers which determine whether an email is junk or not. The proliferation ...
Cormac O'Brien, Carl Vogel