Sciweavers

1583 search results - page 127 / 317
» Standardization and Competitive Advantage
Sort
View
WISEC
2009
ACM
16 years 9 days ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
JCS
1998
117views more  JCS 1998»
15 years 5 months ago
A Semantic-Based Transaction Processing Model for Multilevel Transactions
Multilevel transactions have been proposed for multilevel secure databases; in contrast to most proposals, such transactions allow users to read and write across multiple security...
Indrakshi Ray, Paul Ammann, Sushil Jajodia
ICRA
2008
IEEE
136views Robotics» more  ICRA 2008»
15 years 12 months ago
Modeling multi-robot interaction using generalized occupancy grids, with application to reducing spatial interference
— As part of a program to find methods of reducing spatial interference in multi-robot systems, we propose the Interaction Grid (IG), a generalization of the Occupancy Grid that...
Mauricio Zuluaga, Richard T. Vaughan
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 11 months ago
A Hierarchical Weighted Round Robin EPON DBA Scheme and Its Comparison with Cyclic Water-Filling Algorithm
—A H-WRR (Hierarchical Weighted Round-Robin) EPON (Ethernet Passive Optical Network) DBA (Dynamic Bandwidth Allocation) algorithm is devised and investigated. WRR table entries h...
Chan Kim, Tae-Whan Yoo, Bong-Tae Kim
ISVLSI
2005
IEEE
169views VLSI» more  ISVLSI 2005»
15 years 11 months ago
High Performance Array Processor for Video Decoding
high NRE cost. Therefore, general purpose programmable processors using software to perform various functions become more attractive since programmability can simplify system devel...
J. Lee, Narayanan Vijaykrishnan, Mary Jane Irwin