Sciweavers

1010 search results - page 193 / 202
» Designing Then and Now
Sort
View
CORR
2007
Springer
127views Education» more  CORR 2007»
14 years 11 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
IJVR
2006
116views more  IJVR 2006»
14 years 11 months ago
New Directions in 3D User Interfaces
Three-dimensional user interfaces (3D UIs) support user tasks in many non-traditional interactive systems such as virtual environments, augmented reality, and ubiquitous computing...
Doug A. Bowman, Jian Chen, Chadwick A. Wingrave, J...
JSAC
2008
94views more  JSAC 2008»
14 years 11 months ago
An overview of limited feedback in wireless communication systems
Abstract--It is now well known that employing channel adaptive signaling in wireless communication systems can yield large improvements in almost any performance metric. Unfortunat...
David James Love, Robert W. Heath Jr., Vincent K. ...
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
NETWORK
2006
218views more  NETWORK 2006»
14 years 11 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...