Sciweavers

4099 search results - page 717 / 820
» A Framework for Interactive Proof
Sort
View
ISADS
1999
IEEE
15 years 8 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
DAGM
1999
Springer
15 years 8 months ago
Cooperative Distributed Vision: Dynamic Integration of Visual Perception, Action, and Communication
We believe intelligence does not dwell solely in brain but emerges from active interactions with environments through perception, action, and communication. This paper give an over...
Takashi Matsuyama
ESEC
1999
Springer
15 years 8 months ago
The CIP Method: Component- and Model-Based Construction of Embedded Systems
CIP is a model-based software development method for embedded systems. The problem of constructing an embedded system is decomposed into a functional and a connection problem. The ...
Hugo Fierz
127
Voted
COOPIS
1998
IEEE
15 years 8 months ago
Scheduling Non-Enforceable Contracts among Autonomous Agents
With the emergence of fast and standardized communication infrastructures over which separately designed agents of different organizations can interact in real-time, there is an i...
Thomas Tesch, Karl Aberer
INFOCOM
1998
IEEE
15 years 8 months ago
A Priority Scheme for the IEEE 802.14 MAC Protocol for Hybrid Fiber-Coax Networks
In order to support quality-of-service (QoS) for real-time data communications such as voice, video and interactive services, multiaccess networks must provide an effective priorit...
Mark D. Corner, Nada Golmie, Jörg Liebeherr, ...