Sciweavers

2947 search results - page 10 / 590
» The timely token protocol
Sort
View
IPPS
1998
IEEE
15 years 1 months ago
Self-Testing Fault-Tolerant Real-Time Systems
We propose a periodic diagnostic algorithm based on the testing model of computation for real-time systems. The diagnostic task runs on every processor of the system. When the task...
M. Rooholamini, Seyed H. Hosseini
IPPS
2007
IEEE
15 years 3 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
14 years 6 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 3 months ago
A Token-Based Scheduling Scheme for WLANs and Its Performance Analysis
— Most of the existing WLAN MAC protocols can only provide limited service differentiation. In this paper, we propose a novel token-based scheduling scheme for precise and quanti...
Ping Wang, Weihua Zhuang
WISA
2004
Springer
15 years 2 months ago
License Protection with a Tamper-Resistant Token
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that i...
Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro E...