Sciweavers

3902 search results - page 601 / 781
» Hardware Synthesis from C C Models
Sort
View
142
Voted
MSWIM
2005
ACM
15 years 10 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
MSWIM
2005
ACM
15 years 10 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
NETGAMES
2005
ACM
15 years 10 months ago
On the 802.11 turbulence of nintendo DS and sony PSP hand-held network games
The growth in computer games and wireless networks has catalyzed the production of a new generation of hand-held game consoles that support multi-player gaming over IEEE 802.11 ne...
Mark Claypool
GECCO
2005
Springer
101views Optimization» more  GECCO 2005»
15 years 10 months ago
A scalable parallel genetic algorithm for x-ray spectroscopic analysis
We use a parallel multi-objective genetic algorithm to drive a search and reconstruction spectroscopic analysis of plasma gradients in inertial confinement fusion (ICF) implosion...
Kai Xu, Sushil J. Louis, Roberto C. Mancini
ICWE
2005
Springer
15 years 10 months ago
The Role of Visual Tools in a Web Application Design and Verification Framework: A Visual Notation for LTL Formulae
As the Web becomes a platform for implementing complex B2C and B2B applications, there is a need to extend Web conceptual modeling to process-centric applications. In this context,...
Marco Brambilla, Alin Deutsch, Liying Sui, Victor ...