Sciweavers

7694 search results - page 1265 / 1539
» An Implementation of an Applicative File System
Sort
View
149
Voted
WS
2004
ACM
15 years 10 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
ACOM
2004
Springer
15 years 10 months ago
Toward a Suite of Performatives Based Upon Joint Intention Theory
Agent communication languages defined using joint intention theory have enjoyed a long research history. A number of performatives have been defined and refined in this literature ...
Marcus J. Huber, Sanjeev Kumar, David McGee
ATAL
2004
Springer
15 years 10 months ago
Learning User Preferences for Wireless Services Provisioning
The problem of interest is how to dynamically allocate wireless access services in a competitive market which implements a take-it-or-leave-it allocation mechanism. In this paper ...
George Lee, Steven Bauer, Peyman Faratin, John Wro...
149
Voted
FSE
2004
Springer
155views Cryptology» more  FSE 2004»
15 years 10 months ago
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obt...
Joo Yeon Cho, Josef Pieprzyk
APSEC
2003
IEEE
15 years 10 months ago
An Extensible Framework for Collaborative Software Engineering
The size, complexity and duration of typical software engineering projects means that teams of developers will work on them. However, with the exception of version control systems...
Carl Cook, Neville Churcher
« Prev « First page 1265 / 1539 Last » Next »