Sciweavers

628 search results - page 116 / 126
» General requirements to design mobile shared workspaces
Sort
View
MSWIM
2005
ACM
14 years 1 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
TIT
2002
70views more  TIT 2002»
13 years 7 months ago
High-rate codes that are linear in space and time
Multiple-antenna systems that operate at high rates require simple yet effective space-time transmission schemes to handle the large traffic volume in real time. At rates of tens ...
Babak Hassibi, Bertrand M. Hochwald
ASPLOS
2010
ACM
14 years 2 months ago
Power routing: dynamic power provisioning in the data center
Data center power infrastructure incurs massive capital costs, which typically exceed energy costs over the life of the facility. To squeeze maximum value from the infrastructure,...
Steven Pelley, David Meisner, Pooya Zandevakili, T...
SIGUCCS
2005
ACM
14 years 1 months ago
Developing a synchronous web seminar application for online learning
Many higher education institutions are searching for cost effective tools for the delivery of a feature rich, synchronous online learning environment. While there are several comm...
Michael D. Ciocco, Neil Toporski, Michael Dorris
FSTTCS
2003
Springer
14 years 25 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh