Sciweavers

776 search results - page 108 / 156
» A System Structure for Adaptive Mobile Applications
Sort
View
INFOCOM
2010
IEEE
14 years 9 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
76
Voted
ATC
2007
Springer
15 years 5 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...
86
Voted
ECBS
2004
IEEE
93views Hardware» more  ECBS 2004»
15 years 2 months ago
Domain Independent Generative Modeling
Model Integrated Computing employs domainspecific modeling languages for the design of Computer Based Systems and automatically generates their implementation. These system models...
Branislav Kusy, Ákos Lédeczi, Miklos...
99
Voted
NOSSDAV
2005
Springer
15 years 4 months ago
MOPAR: a mobile peer-to-peer overlay architecture for interest management of massively multiplayer online games
In this paper we propose a fully distributed peer-to-peer (P2P) infrastructure supporting Networked Virtual Environment (NVE) applications, such as massively multiplayer online ga...
Anthony (Peiqun) Yu, Son T. Vuong
95
Voted
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 5 months ago
Synthesis of analog filters on an evolvable hardware platform using a genetic algorithm
This work presents a novel approach to filter synthesis on a field programmable analog array (FPAA) architecture using a genetic algorithm (GA). First, a Matlab model of the FPA...
Joachim Becker, Stanis Trendelenburg, Fabian Henri...