Sciweavers

503 search results - page 36 / 101
» If not now, when
Sort
View
MOBIQUITOUS
2007
IEEE
14 years 5 months ago
Content Source Selection in Bluetooth Networks
—Large scale market penetration of electronic devices equipped with Bluetooth technology now gives the ability to share content (such as music or video clips) between members of ...
Liam McNamara, Cecilia Mascolo, Licia Capra
SECURWARE
2007
IEEE
14 years 5 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
SEFM
2007
IEEE
14 years 5 months ago
Automatically Proving Concurrent Programs Correct
of abstract interpretations in formal methods It is always very satisfying to hear about a theory, in the case at hand it is the theory of abstract interpretations, that explains i...
Byron Cook
VTC
2007
IEEE
111views Communications» more  VTC 2007»
14 years 5 months ago
Analysis of a Spline Based, Obstacle Avoiding Path Planning Algorithm
—The Overbot is one of the original DARPA Grand Challenge vehicles now being used as a platform for autonomous vehicle research. The vehicle, equipped with a complete actuator an...
John Connors, Gabriel Elkaim
AAECC
2007
Springer
109views Algorithms» more  AAECC 2007»
14 years 5 months ago
The Tangent FFT
The split-radix FFT computes a size-n complex DFT, when n is a large power of 2, using just 4n lg n−6n+8 arithmetic operations on real numbers. This operation count was first an...
Daniel J. Bernstein