Sciweavers

186 search results - page 23 / 38
» The x-Wait-Freedom Progress Condition
Sort
View
89
Voted
GLOBECOM
2009
IEEE
15 years 1 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
ACSD
2006
IEEE
89views Hardware» more  ACSD 2006»
15 years 1 months ago
On process-algebraic verification of asynchronous circuits
Asynchronous circuits have received much attention recently due to their potential for energy savings. Process algebras have been extensively used in the modelling, analysis and sy...
Xu Wang, Marta Z. Kwiatkowska
CE
2007
99views more  CE 2007»
14 years 9 months ago
Contextual learning theory: Concrete form and a software prototype to improve early education
In Ôcontextual learning theoryÕ three types of contextual conditions (differentiation of learning procedures and materials, integrated ICT support, and improvement of developme...
Ton Mooij
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 9 months ago
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system ...
Shin-ichi Kuribayashi
CHI
2002
ACM
15 years 10 months ago
Effects of four computer-mediated communications channels on trust development
When virtual teams need to establish trust at a distance, it is advantageous for them to use rich media to communicate. We studied the emergence of trust in a social dilemma game ...
Nathan Bos, Judith S. Olson, Darren Gergle, Gary M...