Sciweavers

495 search results - page 67 / 99
» HIDE : A Logic Based Hardware Development Environment
Sort
View
ACSAC
1999
IEEE
14 years 20 hour ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
IADIS
2004
13 years 9 months ago
A Model for Naturalistic Virtual User Simulation
The aim of this study is to present a contribution in the area of human decision modeling. A state of the art from this research area shows the lack of models combining perceptive...
Laurent Bodic, Pierre Favier, Guillaume Calvet
AMCS
2011
341views Mathematics» more  AMCS 2011»
13 years 2 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
TMC
2012
11 years 10 months ago
MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet
—The pervasive adoption of IEEE 802.11 radios in the past decade has made possible for the easy Internet access from a vehicle, notably drive-thru Internet. Originally designed f...
Tom H. Luan, Xinhua Ling, Xuemin Shen