Sciweavers

1342 search results - page 224 / 269
» Attacks are Protocols Too
Sort
View
ENTCS
2007
95views more  ENTCS 2007»
15 years 1 months ago
Rijndael for Sensor Networks: Is Speed the Main Issue?
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. In previous works, Rijndael has not been considered a suitable encryption algor...
Andrea Vitaletti, Gianni Palombizio
PUC
2000
142views more  PUC 2000»
15 years 1 months ago
Context-Aware Telephony Over WAP
In this paper we introduce a novel approach to share context to enhance the social quality of remote mobile communication. We provide an analysis of how people start a conversation...
Albrecht Schmidt, Antti Takaluoma, Jani Mänty...
VLDB
2002
ACM
126views Database» more  VLDB 2002»
15 years 1 months ago
FAS - A Freshness-Sensitive Coordination Middleware for a Cluster of OLAP Components
Data warehouses offer a compromise between freshness of data and query evaluation times. However, a fixed preference ratio between these two variables is too undifferentiated. Wit...
Uwe Röhm, Klemens Böhm, Hans-Jörg S...
ISBI
2011
IEEE
14 years 5 months ago
Differential information content in staggered multiple shell hardi measured by the tensor distribution function
Diffusion tensor imaging has accelerated the study of brain connectivity, but single-tensor diffusion models are too simplistic to model fiber crossing and mixing. Hybrid diffusio...
Liang Zhan, Alex D. Leow, Iman Aganj, Christophe L...
DAC
2002
ACM
16 years 2 months ago
High-Level specification and automatic generation of IP interface monitors
A central problem in functional verification is to check that a circuit block is producing correct outputs while enforcing that the environment is providing legal inputs. To attac...
Marcio T. Oliveira, Alan J. Hu