Sciweavers

1813 search results - page 64 / 363
» Mechanism Design on Trust Networks
Sort
View
WETICE
2005
IEEE
15 years 5 months ago
Evaluation of an awareness distribution mechanism: A simulation approach
In distributed software engineering, the role of informal communication is frequently overlooked. Participants simply employ their own ad-hoc methods of informal communication. Co...
David Nutter, Cornelia Boldyreff
ICDIM
2007
IEEE
15 years 6 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel
DATE
2008
IEEE
77views Hardware» more  DATE 2008»
15 years 6 months ago
Re-Examining the Use of Network-on-Chip as Test Access Mechanism
Existing work on testing NoC-based systems advocates to reuse the on-chip network itself as test access mechanism (TAM) to transport test data to/from embedded cores. While this m...
Feng Yuan, Lin Huang, Qiang Xu
ICCSA
2005
Springer
15 years 5 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
ICC
2008
IEEE
132views Communications» more  ICC 2008»
15 years 6 months ago
An On-Off Queue Control Mechanism for Scalable Video Streaming over the IEEE 802.11e WLAN
— In this paper, we study the issue of scalable video streaming over IEEE 802.11e EDCA WLANs. Our basic idea is to control the number of “active” nodes on the channel in orde...
Yu Zhang, Chuan Heng Foh, Jianfei Cai