Sciweavers

1498 search results - page 106 / 300
» Collection tree protocol
Sort
View
116
Voted
ICISC
2007
102views Cryptology» more  ICISC 2007»
15 years 4 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
15 years 8 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
153
Voted
QOSIP
2005
Springer
15 years 8 months ago
802.11 MAC Protocol with Selective Error Detection for Speech Transmission
The IEEE 802.11 standard currently does not offer support to exploit the unequal perceptual importance of multimedia bitstreams. All packets affected by channel errors, in fact, ...
Antonio Servetti, Juan Carlos De Martin
116
Voted
FMCAD
2007
Springer
15 years 6 months ago
Transaction Based Modeling and Verification of Hardware Protocols
Modeling hardware through atomic guard/action transitions with interleaving semantics is popular, owing to the conceptual clarity of modeling and verifying the high level behavior ...
Xiaofang Chen, Steven M. German, Ganesh Gopalakris...
133
Voted
AWIC
2005
Springer
15 years 8 months ago
Tuples Extraction from HTML Using Logic Wrappers and Inductive Logic Programming
This paper presents an approach for applying inductive logic programming to information extraction from HTML documents structured as unranked ordered trees. We consider information...
Costin Badica, Amelia Badica, Elvira Popescu