Sciweavers

7080 search results - page 1081 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
119
Voted
NSPW
2003
ACM
15 years 9 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
116
Voted
CORR
2010
Springer
89views Education» more  CORR 2010»
15 years 4 months ago
Power optimized programmable embedded controller
Now a days, power has become a primary consideration in hardware design, and is critical in computer systems especially for portable devices with high performance and more functio...
M. Kamaraju, K. Lal Kishore, A. V. N. Tilak
130
Voted
VRML
2004
ACM
15 years 10 months ago
Interactive Web-based visualisation of block model data
Mining operations have traditionally used specialised software packages to process and visualise valuable mining data. The downside to this approach is that the information can on...
Tony Gill, Con Caris, Guy LeBlanc Smith
HYBRID
2010
Springer
15 years 9 months ago
Safe compositional network sketches: formal framework
NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch assists system integr...
Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Mi...
MOBICOM
2004
ACM
15 years 10 months ago
Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks
One key usage of VANET is to support vehicle safety applications. This use case is characterized by the prominence of broadcasts in scaled settings. In this context, we try to ans...
Marc Torrent-Moreno, Daniel Jiang, Hannes Hartenst...
« Prev « First page 1081 / 1416 Last » Next »