Sciweavers

3275 search results - page 567 / 655
» Issues in Communication Game
Sort
View
EUROCRYPT
2005
Springer
15 years 10 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
ARGMAS
2004
Springer
15 years 10 months ago
Revising Beliefs Through Arguments: Bridging the Gap Between Argumentation and Belief Revision in MAS
This paper compares within the MAS framework two separate threads in the formal study of epistemic change: belief revision and argumentation theories. Belief revision describes how...
Fabio Paglieri, Cristiano Castelfranchi
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
15 years 10 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
P2P
2003
IEEE
130views Communications» more  P2P 2003»
15 years 10 months ago
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
Abstract—In this paper we explore the incentive and architectural issues that arise in Consortia of Peer-to-Peer Wireless Local Area Networks. A P2P WLAN Consortium (PWC) is a co...
Panayotis Antoniadis, Costas Courcoubetis, Elias C...
ICS
1999
Tsinghua U.
15 years 9 months ago
Realizing the performance potential of the virtual interface architecture
The Virtual Interface (VI) Architecture provides protected userlevel communication with high delivered bandwidth and low permessage latency, particularly for small messages. The V...
Evan Speight, Hazim Abdel-Shafi, John K. Bennett