Sciweavers

266 search results - page 26 / 54
» On asymmetric progress conditions
Sort
View
GLOBECOM
2009
IEEE
15 years 1 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
ACSD
2006
IEEE
89views Hardware» more  ACSD 2006»
15 years 1 months ago
On process-algebraic verification of asynchronous circuits
Asynchronous circuits have received much attention recently due to their potential for energy savings. Process algebras have been extensively used in the modelling, analysis and sy...
Xu Wang, Marta Z. Kwiatkowska
CE
2007
99views more  CE 2007»
14 years 9 months ago
Contextual learning theory: Concrete form and a software prototype to improve early education
In Ôcontextual learning theoryÕ three types of contextual conditions (differentiation of learning procedures and materials, integrated ICT support, and improvement of developme...
Ton Mooij
PAMI
2010
160views more  PAMI 2010»
14 years 8 months ago
In the Eye of the Beholder: A Survey of Models for Eyes and Gaze
—Despite active research and significant progress in the last 30 years, eye detection and tracking remains challenging due to the individuality of eyes, occlusion, variability in...
Dan Witzner Hansen, Qiang Ji
ECAI
2004
Springer
15 years 3 months ago
From Knowledge-Based Programs to Graded Belief-Based Programs Part I: On-Line Reasoning
Knowledge-based programs (KBPs) are a powerful notion for expressing action policies in which branching conditions refer to implicit knowledge and call for a deliberation task at e...
Noël Laverny, Jérôme Lang