Sciweavers

3296 search results - page 650 / 660
» Gathercast with Active Networks
Sort
View
IWSEC
2009
Springer
14 years 2 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
PETRA
2009
ACM
14 years 2 months ago
Ambient kitchen: designing situated services using a high fidelity prototyping environment
The Ambient Kitchen is a high fidelity prototype for exploring the design of pervasive computing algorithms and applications for everyday environments. The environment integrates ...
Patrick Olivier, Guangyou Xu, Andrew Monk, Jesse H...
CLADE
2008
IEEE
14 years 2 months ago
SWARM: a scientific workflow for supporting bayesian approaches to improve metabolic models
With the exponential growth of complete genome sequences, the analysis of these sequences is becoming a powerful approach to build genome-scale metabolic models. These models can ...
Xinghua Shi, Rick Stevens
ICC
2008
IEEE
116views Communications» more  ICC 2008»
14 years 2 months ago
Intelligent Weather Aware Scheme for Satellite Systems
— Rain, snow, gaseous, cloud, fog, scintillation and other atmospheric properties can have a distorting effect on signal fidelity of Ku and Ka bands, thus resulting in excessive ...
Kamal Harb, Changcheng Huang, Anand Srinivasan, Br...
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 2 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King