Sciweavers

2484 search results - page 377 / 497
» Polymatroids with Network Coding
Sort
View
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
DAC
2009
ACM
15 years 9 months ago
Endosymbiotic computing: enabling surrogate GUI and cyber-physical connectivity
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Pai H. Chou
PERVASIVE
2009
Springer
15 years 9 months ago
Inferring Identity Using Accelerometers in Television Remote Controls
Abstract. We show that accelerometers embedded in a television remote control can be used to distinguish household members based on the unique way each person wields the remote. Th...
Keng-hao Chang, Jeffrey Hightower, Branislav Kveto...
150
Voted
ICC
2009
IEEE
169views Communications» more  ICC 2009»
15 years 9 months ago
Protocols and Resource Allocation for the Two-Way Relay Channel with Half-Duplex Terminals
—The two-way relay channel (TWRC) describes the communication between two terminals sharing a common relay. In this work we compare different protocols for the TWRC with a half-d...
Adrian Agustin, Josep Vidal, Olga Muñoz
RTAS
2009
IEEE
15 years 9 months ago
Partial Program Admission
Abstract—Real-time systems on non-preemptive platforms require a means of bounding the execution time of programs for admission purposes. Worst-Case Execution Time (WCET) is most...
Michael Wilson, Ron Cytron, Jonathan S. Turner