Sciweavers

334 search results - page 43 / 67
» Concurrency Among Strangers
Sort
View
ICNS
2009
IEEE
14 years 2 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
ICC
2008
IEEE
153views Communications» more  ICC 2008»
14 years 2 months ago
MARIA: Interference-Aware Admission Control and QoS Routing in Wireless Mesh Networks
Abstract— Interference among concurrent transmissions complicates QoS provisioning for multimedia applications in wireless mesh networks. In this paper we propose MARIA (Mesh Adm...
Xiaolin Cheng, Prasant Mohapatra, Sung-Ju Lee, Suj...
IROS
2008
IEEE
131views Robotics» more  IROS 2008»
14 years 2 months ago
OpenRDK: A modular framework for robotic software development
— Intense efforts to define a common structure in robotic applications, both from a conceptual and from an implementation point of view, have been carried out in the last years ...
Daniele Calisi, Andrea Censi, Luca Iocchi, Daniele...
PIMRC
2008
IEEE
14 years 2 months ago
Adaptive radio resource management for a cellular system with fixed relay nodes
— Future mobile communications systems demand for higher data rates and service quality compared to state-of-the-art systems. One way to achieve this ambitious goal is to use rel...
Fredrik Boye, Peter Rost, Gerhard Fettweis
VTS
2007
IEEE
95views Hardware» more  VTS 2007»
14 years 1 months ago
Delay Test Quality Evaluation Using Bounded Gate Delays
: Conventionally, path delay tests are derived in a delay-independent manner, which causes most faults to be robustly untestable. Many non-robust tests are found but, in practice, ...
Soumitra Bose, Vishwani D. Agrawal