Sciweavers

6555 search results - page 1134 / 1311
» Secure attribute-based systems
Sort
View
IRI
2006
IEEE
15 years 9 months ago
Toward component non-functional interoperability analysis: A UML-based and goal-oriented approach
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
IROS
2006
IEEE
127views Robotics» more  IROS 2006»
15 years 9 months ago
A Pilot Study on Teleoperated Mobile Robots in Home Environments
– Mobile robots operating in home environments must deal with constrained space and a great variety of obstacles and situations to handle. This article presents a pilot study aim...
Daniel Labonte, François Michaud, Patrick B...
ISCAS
2006
IEEE
108views Hardware» more  ISCAS 2006»
15 years 9 months ago
An optimal normal basis elliptic curve cryptoprocessor for inductive RFID application
In this paper a 173-bit type II ONB ECC processor Section II introduces the mathematical backgrounds for for inductive RFID applications is described. Compared with curve operation...
Pak-Keung Leung, Oliver Chiu-sing Choy, Cheong-fat...
124
Voted
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
15 years 9 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
120
Voted
ACMSE
2006
ACM
15 years 9 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
« Prev « First page 1134 / 1311 Last » Next »