Sciweavers

669 search results - page 57 / 134
» Mastering the Master Theorem
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 4 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
AGILEDC
2007
IEEE
15 years 4 months ago
Scaling Product Ownership
Many people ask the question “Does Scrum scale?” especially those who have been scarred by Scrum done badly or those who are resistant to change. Our experience has led us to ...
Mike Lowery, Marcus Evans
ECBS
2007
IEEE
115views Hardware» more  ECBS 2007»
15 years 4 months ago
Modeling the Functionality of Multi-Functional Software Systems
Today, many software-based, reactive systems offer a multitude of functionality. One way to master the development of such a system is to model its functionality on an abstract le...
Alexander Gruler, Alexander Harhurin, Judith Hartm...
GLOBECOM
2007
IEEE
15 years 4 months ago
Impact of Noisy Carrier Phase Synchronization on Linear Amplify-and-Forward Relaying
—We consider a distributed wireless network where amplify-and-forward relays assist the communication between multiple source/destination pairs. To provide a global phase referen...
Stefan Berger, Armin Wittneben
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 4 months ago
Joint Reference Modeling: Collaboration Support through Version Management
The derivation of specific models from reference models corresponds with the creation of reference model variants. Research on the design of such variant constructions generally a...
Oliver Thomas