Sciweavers

130 search results - page 20 / 26
» Discrete-Event Simulation for the Design and Evaluation of P...
Sort
View
SENSYS
2005
ACM
14 years 1 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
GECCO
2009
Springer
122views Optimization» more  GECCO 2009»
14 years 2 months ago
Evolving symmetric and modular neural networks for distributed control
Problems such as the design of distributed controllers are characterized by modularity and symmetry. However, the symmetries useful for solving them are often difficult to determ...
Vinod K. Valsalam, Risto Miikkulainen
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
AHSWN
2006
206views more  AHSWN 2006»
13 years 7 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
MICCAI
1999
Springer
13 years 11 months ago
On the Feasibility of a Moving Support for Surgery on the Beating Heart
Abstract. In this paper the use of a heart-tracking hand support is proposed to allow coronary artery bypass grafting surgery to take place on the beating heart. This method elimin...
Ana Luisa Trejos, S. E. Salcudean, F. Sassani, Sam...