Sciweavers

495 search results - page 67 / 99
» HIDE : A Logic Based Hardware Development Environment
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
IADIS
2004
15 years 5 months ago
A Model for Naturalistic Virtual User Simulation
The aim of this study is to present a contribution in the area of human decision modeling. A state of the art from this research area shows the lack of models combining perceptive...
Laurent Bodic, Pierre Favier, Guillaume Calvet
AMCS
2011
341views Mathematics» more  AMCS 2011»
14 years 10 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica
JDCTA
2010
150views more  JDCTA 2010»
14 years 10 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
TMC
2012
13 years 6 months ago
MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet
—The pervasive adoption of IEEE 802.11 radios in the past decade has made possible for the easy Internet access from a vehicle, notably drive-thru Internet. Originally designed f...
Tom H. Luan, Xinhua Ling, Xuemin Shen