Sciweavers

ISICT
2003
13 years 8 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
ISICT
2003
13 years 8 months ago
Tag semantics for the retrieval of XML documents
Word Sense Disambiguation (WSD), in the field of Natural Language Processing (NLP), consists in assigning the correct sense (semantics) to a word form (lexeme) by means of the cont...
Davide Buscaldi, Giovanna Guerrini, Marco Mesiti, ...
ISICT
2003
13 years 8 months ago
Iso-phone: a total submersion telephonic experience
: In this paper we describe the Iso-phone, a telecommunications concept providing a service that can be described simply as a meeting of the telephone and the floatation tank. By b...
James Auger, Jimmy Loizeau, Stefan Agamanolis
ISICT
2003
13 years 8 months ago
An evolutionary approach for reducing the energy in address buses
In this paper we present a genetic approach for the efficient generation of an encoder to minimize switching activity on the high-capacity lines of a communication bus. The appro...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
ISICT
2003
13 years 8 months ago
Intelligent access and mobility management in heterogeneous wireless networks using policy
The next generation of mobile networks will utilise multiple radio access technologies. These heterogeneous wireless networks will enable the user to seamlessly roam between the d...
Ken Murray, Rajiv Mathur, Dirk Pesch
ISICT
2003
13 years 8 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
ISICT
2003
13 years 8 months ago
Towards a natural interface to adaptive service composition
As computers become ubiquitous in our every day lives, providing a means for true user empowerment will become crucial. Techniques which allow dynamic reuse and composition of exi...
Steffen Higel, Tony O'Donnell, Vincent Wade
ISICT
2003
13 years 8 months ago
MAI-suppression with fractional T-equalizer for CDMA
Wideband CDMA systems with orthogonal spreading codes suffer severely due to the loss of orthogonality by multipath propagation. This yields Multiple Access Interference (MAI) wh...
Klaus Knoche, Jäurgen Rinas, Karl-Dirk Kammey...
ISICT
2003
13 years 8 months ago
Security in the Web Services Framework
The Web Services Framework provides techniques to enable the application-toapplication use of the Web. It has the potential of becoming the core of a new Web-based middleware plat...
Chen Li 0008, Claus Pahl