Sciweavers

832 search results - page 32 / 167
» Effect of Malicious Synchronization
Sort
View
EUC
2007
Springer
14 years 4 months ago
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronizati...
JaeCheol Ha, Sang-Jae Moon, Juan Manuel Gonz&aacut...
MM
1993
ACM
105views Multimedia» more  MM 1993»
14 years 1 months ago
Synchronous Bandwidth Allocation in FDDI Networks
It is well-known that an FDDI token ring network provides a guaranteed throughput for synchronous messages and a bounded medium access delay for each node/station. However, this f...
Qin Zheng, Kang G. Shin
ICALT
2006
IEEE
14 years 3 months ago
Multi-Dimensional Model-based Genericity in Omega+
Future CSCL technologies are described by the community as flexible, tailorable, and appropriate for various collaborative settings, conditions and contexts. This paper describes ...
Jacques Lonchamp
LISP
1998
94views more  LISP 1998»
13 years 9 months ago
Scheme: A Interpreter for Extended Lambda Calculus
Inspired by ACTORS [7, 17], we have implemented an interpreter for a LISP-like language, SCHEME, based on the lambda calculus [2], but extended for side effects, multiprocessing, a...
Gerald J. Sussman, Guy L. Steele Jr.
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 4 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...