Sciweavers

872 search results - page 108 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
SMI
2006
IEEE
135views Image Analysis» more  SMI 2006»
14 years 1 months ago
Laplace-Beltrami Eigenfunctions Towards an Algorithm That "Understands" Geometry
One of the challenges in geometry processing is to automatically reconstruct a higher-level representation from raw geometric data. For instance, computing a parameterization of a...
Bruno Lévy
VTC
2006
IEEE
101views Communications» more  VTC 2006»
14 years 1 months ago
Coexistence and Interworking of IEEE 802.16 and IEEE 802.11(e)
— The coexistence and interworking of IEEE 802.16 and IEEE 802.11 is an acute problem. The frame-based medium access of 802.16 requires rigorous protection against interference f...
Lars Berlemann, Christian Hoymann, Guido R. Hiertz...
STORAGESS
2006
ACM
14 years 1 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
WONS
2005
IEEE
14 years 1 months ago
MASSIVE: An Emulation Environment for Mobile Ad-Hoc Networks
Developing and evaluating protocols and applications for mobile ad-hoc networks requires significant organisational effort when real mobile ad-hoc networks with several mobile te...
Michael Matthes, Holger Biehl, Michael Lauer, Oswa...
ATVA
2005
Springer
111views Hardware» more  ATVA 2005»
14 years 1 months ago
Model Checking Prioritized Timed Automata
Abstract. Priorities are often used to resolve conflicts in timed systems. However, priorities are not directly supported by state-of-art model checkers. Often, a designer has to ...
Shang-Wei Lin, Pao-Ann Hsiung, Chun-Hsian Huang, Y...