Sciweavers

798 search results - page 92 / 160
» Statecharts as Protocols for Objects
Sort
View
ICWN
2003
15 years 1 months ago
Eurecom IPv6 Soft Handover
The growing demand for high-speed wireless access to the Internet is the driving force behind the current trends to design All-IP wireless networks, whose Access Router and mobile ...
Farouk Belghoul, Yan Moret, Christian Bonnet
COMCOM
2006
97views more  COMCOM 2006»
14 years 12 months ago
Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks
A number of routing protocols [1] have been proposed for wireless sensor networks in recent years. Considering energy-efficiency as the primary objective, most of routing protocol...
Min Chen, Taekyoung Kwon, Yanghee Choi
JOC
2007
133views more  JOC 2007»
14 years 11 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
JSS
2002
63views more  JSS 2002»
14 years 11 months ago
Strategies for resolving inter-class data conflicts in mixed real-time database systems
Although many efficient concurrency control protocols have been proposed for real-time database systems, they are mainly designed for the systems with a single type of real-time t...
Kam-yiu Lam, Tei-Wei Kuo, Tony S. H. Lee
COMPSAC
2009
IEEE
15 years 6 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...