Sciweavers

1713 search results - page 131 / 343
» On the Importance of Being Quantum
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
RTAS
2005
IEEE
15 years 3 months ago
Convoy Driving through Ad-Hoc Coalition Formation
— Convoy driving on public highways is a useful phenomena which increases the safety and the throughput of the highway. We present an approach through which a wireless Convoy Dri...
Majid Ali Khan, Ladislau Bölöni
MSWIM
2005
ACM
15 years 3 months ago
A controlled-access scheduling mechanism for QoS provisioning in IEEE 802.11e wireless LANs
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
Yaser Pourmohammadi Fallah, Hussein M. Alnuweiri
INFOCOM
2003
IEEE
15 years 3 months ago
A Framework for Reliable Routing in Mobile Ad Hoc Networks
— Mobile ad hoc networks consist of nodes that are often vulnerable to failure. As such, it is important to provide redundancy in terms of providing multiple nodedisjoint paths f...
Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K....
HICSS
2002
IEEE
127views Biometrics» more  HICSS 2002»
15 years 3 months ago
What Does It Mean for an Organisation to Be Intelligent? Measuring Intellectual Bandwidth for Value Creation
The importance of electronic collaboration has risen as successful organisations recognize that they need to convert their intellectual resources into goods and services their cus...
Sajda Qureshi, Andries van der Vaart, Gijs Kauling...