Sciweavers

2518 search results - page 59 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
116
Voted
COMCOM
2000
143views more  COMCOM 2000»
15 years 2 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
ICCCN
1998
IEEE
15 years 6 months ago
A Two-Phase Inter-Switch Handoff Scheme for Wireless ATM Networks
Supporting mobility in Wireless ATM networks poses a number of technical issues. An important issue is the ability to reroute ongoing virtual connections during handoff as mobile ...
Khaled Salah, Elias Drakopoulos
SASN
2005
ACM
15 years 8 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
117
Voted
ICRA
2002
IEEE
120views Robotics» more  ICRA 2002»
15 years 7 months ago
Position Based Visual Servoing: Keeping the Object in the Field of Vision
Visual servoing requires an object in the field of view of the camera, in order to control the robot evolution. Otherwise, the virtual link is broken and the control loop cannot c...
Benoit Thuilot, Philippe Martinet, Lionel Cordesse...
123
Voted
RTAS
1999
IEEE
15 years 6 months ago
User Level Scheduling of Communicating Real-Time Tasks
Unique challenges are present when one tries to build distributed real-time applications using standard o -the-shelf systems which are in common use but are not necessarily design...
Chia Shen, Oscar González, Krithi Ramamrith...