Sciweavers

3341 search results - page 603 / 669
» A Communication Virtual Machine
Sort
View
IPSN
2007
Springer
14 years 2 months ago
NIST smart data flow system II: speaker localization
Multimodal applications require the acquisition and processing of massive amounts of information from multiple sensors. Because this process is beyond the capabilities of a single...
Antoine Fillinger, Lukas Diduch, Imad Hamchi, St&e...
PERVASIVE
2007
Springer
14 years 2 months ago
Operating Appliances with Mobile Phones - Strengths and Limits of a Universal Interaction Device
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
14 years 2 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
AINA
2006
IEEE
14 years 2 months ago
Modeling, Predicting and Optimizing Redistribution between Clusters on Low Latency Networks
In this paper we study the problem of scheduling messages between two parallel machines connected by a low latency network during a data redistribution. We compare two approaches....
Emmanuel Jeannot, Frédéric Wagner
CIMCA
2006
IEEE
14 years 2 months ago
Timed-MPSG: A Formal Model for Real-Time Shop Floor Controller
The MPSG (Message-based Part State Graph) model has been developed for the execution portion of shop-floor controllers that operate in a distributed and hierarchical control envir...
Devinder Thapa, Jaeil Park, Gi-Nam Wang, Dongmin S...