Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
JCS
2011
87views more  JCS 2011»
9 years 8 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke
IJMMS
2007
195views more  IJMMS 2007»
10 years 1 months ago
Berlin Brain-Computer Interface - The HCI communication channel for discovery
The investigation of innovative Human–Computer Interfaces (HCI) provides a challenge for future interaction research and development. Brain–Computer Interfaces (BCIs) exploit ...
Roman Krepki, Gabriel Curio, Benjamin Blankertz, K...
CLIMA
2006
10 years 2 months ago
Belief Updating by Communication Channel
In this paper, we introduce the notion of communication channel into a multiagent system. We formalize the system in term of logic with Belief modality, where each possible world i...
Shingo Hagiwara, Mikito Kobayashi, Satoshi Tojo
FDL
2008
IEEE
10 years 3 months ago
RTL Generation of Channel Architecture Templates for a Template-based SoC Design Flow
In this paper, we propose the design methodology for communication channel templates from formal specification to RTL description. In this flow, design and verification start from...
Jinhyun Cho, Soonwoo Choi, Soo Chae
CRYPTO
2008
Springer
123views Cryptology» more  CRYPTO 2008»
10 years 3 months ago
Collusion-Free Protocols in the Mediated Model
Prior approaches [15, 14] to building collusion-free protocols require exotic channels. By taking a conceptually new approach, we are able to use a more digitally-friendly communic...
Joël Alwen, Abhi Shelat, Ivan Visconti
ASM
2008
ASM
10 years 3 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
CHI
1994
ACM
10 years 5 months ago
Speech dialogue with facial displays
Human face-to-face conversation is an ideal model for human-computer dialogue. One of the major features of face-to-face communication is its multiplicity of communication channel...
Akikazu Takeuchi, Katashi Nagao
IPPS
1999
IEEE
10 years 5 months ago
A Consistent History Link Connectivity Protocol
The RAIN (Reliable Array of Independent Nodes) project at Caltech is focusing on creating highly reliable distributed systems by leveraging commercially available personal compute...
Paul S. LeMahieu, Jehoshua Bruck
HSNMC
2004
Springer
158views Multimedia» more  HSNMC 2004»
10 years 6 months ago
HMM-Based Monitoring of Packet Channels
Abstract. Performance of real-time applications on network communication channels are strongly related to losses and temporal delays. Several studies showed that these network feat...
Pierluigi Salvo Rossi, Francesco Palmieri, Giulio ...
ICIP
2005
IEEE
10 years 7 months ago
A transcoding robust data hiding method for image communication applications
We present a data embedding method for image communication applications. Our goal is to implement novel multimedia applications such as multi-language captions, interactive progra...
Cagatay Candan
books