Sciweavers

341 search results - page 31 / 69
» The way forward
Sort
View
SEC
2001
14 years 11 months ago
Security Analysis of the Cliques Protocols Suites: First Results
: The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a...
Olivier Pereira, Jean-Jacques Quisquater
ASPDAC
2009
ACM
109views Hardware» more  ASPDAC 2009»
14 years 11 months ago
Soft lists: a native index structure for NOR-flash-based embedded devices
Efficient data indexing is significant to embedded devices, because both CPU cycles and energy are very precious resources. Soft lists, a new index structure for embedded devices w...
Li-Pin Chang, Chen-Hui Hsu
CHI
2010
ACM
15 years 4 months ago
Astrojumper: motivating children with autism to exercise using a VR game
Children with autism have shown substantial benefit ult to from rigorous exercise, however, it is often diffic ually motivate these children to exercise due to their us sedent...
Samantha L. Finkelstein, Andrea Nickel, Tiffany Ba...
AHSWN
2007
116views more  AHSWN 2007»
14 years 10 months ago
On the Lifetime of Large Wireless Sensor Networks with Multiple Battery Levels
Large wireless sensor networks promise to revolutionize the way we sense and control the physical world. In large networks the nodes within the range of the base station forward d...
Mihail L. Sichitiu, Rudra Dutta
ENTCS
2008
64views more  ENTCS 2008»
14 years 9 months ago
Service Discovery and Negotiation With COWS
To provide formal foundations to current (web) services technologies, we put forward using COWS, a process calculus for specifying, combining and analysing services, as a uniform ...
Alessandro Lapadula, Rosario Pugliese, Francesco T...