Sciweavers

9071 search results - page 1700 / 1815
» A co-design modeling approach for computer network systems
Sort
View
FPL
1999
Springer
147views Hardware» more  FPL 1999»
15 years 2 months ago
Synthia: Synthesis of Interacting Automata Targeting LUT-based FPGAs
This paper details the development, implementation, and results of Synthia, a system for the synthesis of Finite State Machines (FSMs) to field-programmable logic. Our approach us...
George A. Constantinides, Peter Y. K. Cheung, Wayn...
ATAL
2006
Springer
15 years 1 months ago
Agent-community based peer-to-peer information retrieval: an evaluation
The Agent-Community-based Peer-to-Peer Information Retrieval (ACP2P) method uses agent communities to manage and look up information of interest to users. An agent works as a dele...
Tsunenori Mine, Akihiro Kogo, Makoto Amamiya
IADIS
2004
14 years 11 months ago
Connect: Designing the Classroom of Tomorrow by Using Advanced Technologies to Connect Formal and Informal Learning Environments
The main objective of the CONNECT project is to develop an innovative pedagogical framework that attempts to blend formal and informal learning, proposing an educational reform to ...
Sofoklis Sotiriou, Eleni Chatzichristou, Stavros S...
ICISC
2004
127views Cryptology» more  ICISC 2004»
14 years 11 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
COMCOM
2008
91views more  COMCOM 2008»
14 years 10 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
« Prev « First page 1700 / 1815 Last » Next »