Sciweavers

43264 search results - page 8140 / 8653
» Comparing models of computation
Sort
View
NEW2AN
2007
Springer
15 years 10 months ago
Real Life Field Trial over a Pre-mobile WiMAX System with 4th Order Diversity
Mobile WiMAX is a promising wireless technology approaching market deployment. Much discussion concentrate on whether mobile WiMAX will reach a tipping point and become 4G or not. ...
Pål Grønsund, Paal Engelstad, Moti Ay...
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
POLICY
2007
Springer
15 years 10 months ago
Web Rule Languages to Carry Policies
Recent efforts in the area of Web policy languages show concerns on how to better represent both context and rules of a domain to deal with large number of resources and users. In...
Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd W...
ROBOCUP
2007
Springer
140views Robotics» more  ROBOCUP 2007»
15 years 10 months ago
Tailored Real-Time Simulation for Teams of Humanoid Robots
Abstract. Developing and testing the key modules of autonomous humanoid soccer robots (e.g., for vision, localization, and behavior control) in software-in-the-loop (SIL) experimen...
Martin Friedmann, Karen Petersen, Oskar von Stryk
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
15 years 10 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
« Prev « First page 8140 / 8653 Last » Next »