Sciweavers

29079 search results - page 5778 / 5816
» Design Of Future Systems
Sort
View
JUCS
2008
113views more  JUCS 2008»
14 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
MAGS
2008
104views more  MAGS 2008»
14 years 9 months ago
Retractable contract network for empowerment in workforce scheduling
This paper is about business modelling and negotiation protocol design in distributed scheduling, where individual agents have individual (potentially conflicting) interests. It i...
Edward P. K. Tsang, Timothy Gosling, Botond Virgin...
JSA
2006
97views more  JSA 2006»
14 years 9 months ago
Dynamic feature selection for hardware prediction
It is often possible to greatly improve the performance of a hardware system via the use of predictive (speculative) techniques. For example, the performance of out-of-order micro...
Alan Fern, Robert Givan, Babak Falsafi, T. N. Vija...
JSAC
2006
77views more  JSAC 2006»
14 years 9 months ago
Spectral shaping of UWB signals for time-hopping impulse radio
This paper studies the design of signaling waveforms for time-hopping impulse radio (TH-IR) with limits on the power spectral density. Such restrictions are imposed by the spectra...
Yves-Paul Nakache, Andreas F. Molisch
JSAC
2006
181views more  JSAC 2006»
14 years 9 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
« Prev « First page 5778 / 5816 Last » Next »