Sciweavers

34 search results - page 2 / 7
» sutc 2006
Sort
View
SUTC
2006
IEEE
13 years 10 months ago
An Efficient Soft-Input Scaling Scheme for Turbo Decoding
Yi-Nan Lin, Wei-Wen Hung, Wei-Chen Lin, Tsan-Jieh ...
SUTC
2006
IEEE
13 years 10 months ago
DynamicTrust: The Trust Development in Peer-to-Peer Environments
In peer-to-peer (P2P) environments, trust is a very important issue when transactions/interactions occur between peers. In general, the trust evaluation on transactions/interactio...
Yang Wang, Vijay Viradharajan
SUTC
2006
IEEE
13 years 10 months ago
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance b...
Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh...
SUTC
2006
IEEE
13 years 10 months ago
An Indoor Localization Mechanism Using Active RFID Tag
The location-aware technology and its application are prerequisite to realize the ubiquitous computing. However, another special system for indoor localization is needed in the co...
Guang-yao Jin, Xiao-Yi Lu, Myong-Soon Park
SUTC
2006
IEEE
13 years 10 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo