Sciweavers

2418 search results - page 80 / 484
» Requirements for mobile photoware
Sort
View
FC
2008
Springer
134views Cryptology» more  FC 2008»
14 years 11 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
IJIT
2004
14 years 11 months ago
Formal Verification of a Multicast Protocol In Mobile Networks
As computer network technology becomes increasingly complex, it becomes necessary to place greater requirements on the validity of developing standards and the resulting technology...
Mohammad Reza Matash Borujerdi, S. M. Mirzababaei
DAIS
2003
14 years 11 months ago
A Variable Cache Consistency Protocol for Mobile Systems Using Time Locks
Abstract. By locally caching data, mobile hosts can operate while disconnected from the central server, however, consistency of data becomes more difficult to maintain. In this pap...
Abhinav Vora, Zahir Tari, Peter Bertók
IJCAI
2003
14 years 11 months ago
Non-Invasive Brain-Actuated Control of a Mobile Robot
Recent experiments have indicated the possibility to use the brain electrical activity to directly control the movement of robotics or prosthetic devices. In this paper we report ...
José del R. Millán, Fréd&eacu...
DOA
2000
87views more  DOA 2000»
14 years 11 months ago
MODE: A Java-like Environment for Experimenting Mobility Policies
The wide acceptance of object-oriented environments and proposals has renewed interest in all the class inheritance related issues; in particular its implementation in distributed...
Giuliano Armano, Antonio Corradi, Letizia Leonardi...