Sciweavers

537 search results - page 5 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
JIPS
2008
127views more  JIPS 2008»
13 years 7 months ago
Comparative Study on the Educational Use of Home Robots for Children
: Human-Robot Interaction (HRI), based on already well-researched Human-Computer Interaction (HCI), has been under vigorous scrutiny since recent developments in robot technology. ...
Jeonghye Han, Miheon Jo, Vicki Jones, Jun H. Jo
SC
2009
ACM
14 years 2 days ago
Comparative study of one-sided factorizations with multiple software packages on multi-core hardware
The emergence and continuing use of multi-core architectures require changes in the existing software and sometimes even a redesign of the established algorithms in order to take ...
Emmanuel Agullo, Bilel Hadri, Hatem Ltaief, Jack D...
CCS
2003
ACM
14 years 19 days ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning
SPIN
1999
Springer
13 years 11 months ago
Assume-Guarantee Model Checking of Software: A Comparative Case Study
A variety of assume-guarantee model checking approaches have been proposed in the literature. In this paper, we describe several possible implementations of those approaches for ch...
Corina S. Pasareanu, Matthew B. Dwyer, Michael Hut...
ICC
2009
IEEE
13 years 5 months ago
Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
Abstract--In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid...
Ayan Roy Chowdhury, John S. Baras