Sciweavers

3522 search results - page 667 / 705
» Incremental physical design
Sort
View
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 6 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
ATAL
2009
Springer
15 years 6 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
ICCS
2009
Springer
15 years 6 months ago
A Scalable and Adaptable Solution Framework within Components of the Community Climate System Model
Abstract. A framework for a fully implicit solution method is implemented into (1) the High Order Methods Modeling Environment (HOMME), which is a spectral element dynamical core o...
Katherine J. Evans, Damian W. I. Rouson, Andrew G....
IMC
2009
ACM
15 years 6 months ago
Characterizing VLAN-induced sharing in a campus network
Many enterprise, campus, and data-center networks have complex layer-2 virtual LANs (“VLANs”) below the IP layer. The interaction between layer-2 and IP topologies in these VL...
Muhammad Mukarram Bin Tariq, Ahmed Mansy, Nick Fea...
UIST
2009
ACM
15 years 6 months ago
Bonfire: a nomadic system for hybrid laptop-tabletop interaction
We present Bonfire, a self-contained mobile computing system that uses two laptop-mounted laser micro-projectors to project an interactive display space to either side of a laptop...
Shaun K. Kane, Daniel Avrahami, Jacob O. Wobbrock,...