Sciweavers

1270 search results - page 178 / 254
» IF Validation Environment Tutorial
Sort
View
INFOCOM
2006
IEEE
15 years 8 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
IROS
2006
IEEE
136views Robotics» more  IROS 2006»
15 years 8 months ago
Adaptive Interacting Multiple Models applied on pedestrian tracking in car parks
— To address perception problems we must be able to track dynamics targets of the environment. An important issue of tracking is filtering problem in which estimates of the targ...
Julien Burlet, Olivier Aycard, Anne Spalanzani, Ch...
LCN
2006
IEEE
15 years 8 months ago
Packet Dispersion in IEEE 802.11 Wireless Networks
— Packet dispersion techniques have been commonly used to estimate bandwidth in wired networks. However, current packet dispersion techniques were developed for wired network env...
Mingzhe Li, Mark Claypool, Robert E. Kinicki
ECLIPSE
2006
ACM
15 years 8 months ago
Guidance through active concerns
Producing usable documentation has always been a tedious task, and even communicating important knowledge about a system among collaborators is difficult. This paper describes an ...
Barthélémy Dagenais, Harold Ossher
127
Voted
NETGAMES
2006
ACM
15 years 8 months ago
Count down protocol: asynchronous consistent protocol in P2P virtual ball game
This paper studies a way to improve consistency of states in a ball game typed DVE with lag, in P2P architecture. We also study how to control shared objects in real-time in a ser...
Yoshihiro Kawano, Tatsuhiro Yonekura