Sciweavers

1272 search results - page 78 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
VTC
2007
IEEE
14 years 3 months ago
User Demand Based WLAN Design and Optimisation
— The rapid increase in the use of IEEE 802.11 Wireless Local Area Networks (WLAN) for a diverse range of applications, has introduced an increased complexity into WLAN design, a...
Alan McGibney, Martin Klepal, Dirk Pesch
CGI
2003
IEEE
14 years 23 days ago
Cut-and-Paste Editing Based on Constrained B-spline Volume Fitting
This paper proposes an advanced cut-and-paste editing for three-dimensional models. We introduce a new parameterization technique based on constrained B-spline surface/volume fitt...
Yoshiyuki Furukawa, Hiroshi Masuda, Kenjiro T. Miu...
ICCD
1997
IEEE
90views Hardware» more  ICCD 1997»
14 years 20 days ago
TITAC-2: An asynchronous 32-bit microprocessor based on Scalable-Delay-Insensitive model
Asynchronous design has a potential of solving many difficulties, such as clock skew and power consumption, which synchronous counterpart suffers with current and future VLSI tech...
Akihiro Takamura, Masashi Kuwako, Masashi Imai, Ta...
CCS
2010
ACM
14 years 4 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
ICC
2007
IEEE
105views Communications» more  ICC 2007»
14 years 3 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang