Sciweavers

1144 search results - page 189 / 229
» Implementation of end-to-end abstractions in a network servi...
Sort
View
SIGCSE
2002
ACM
126views Education» more  SIGCSE 2002»
14 years 10 months ago
Design patterns for games
Designing a two-person game involves identifying the game model to compute the best moves, the user interface (the "view") to play the game, and the controller to coordi...
Dung Zung Nguyen, Stephen B. Wong
ACMICEC
2005
ACM
156views ECommerce» more  ACMICEC 2005»
15 years 4 months ago
A web services-based business interactions manager to support electronic commerce applications
Electronic commerce applications (e-commerce) need connecting technologies to support the external, agreed-upon or flexible business processes. This requires a specification of th...
Youcef Baghdadi
ICCSA
2005
Springer
15 years 4 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
ICCAD
2010
IEEE
119views Hardware» more  ICCAD 2010»
14 years 9 months ago
Symbolic system level reliability analysis
Abstract--More and more embedded systems provide a multitude of services, implemented by a large number of networked hardware components. In early design phases, dimensioning such ...
Michael Glaß, Martin Lukasiewycz, Felix Reim...
SENSYS
2004
ACM
15 years 4 months ago
Sensor network-based countersniper system
An ad-hoc wireless sensor network-based system is presented that detects and accurately locates shooters even in urban environments. The system consists of a large number of cheap...
Gyula Simon, Miklós Maróti, Á...