Sciweavers

1249 search results - page 6 / 250
» Limitations of the Even-Mansour Construction
Sort
View
RFIDSEC
2010
13 years 5 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
MMSYS
2012
199views more  MMSYS 2012»
12 years 3 months ago
AngelCast: cloud-based peer-assisted live streaming using optimized multi-tree construction
Increasingly, commercial content providers (CPs) offer streaming and IPTV solutions that leverage an underlying peerto-peer (P2P) stream distribution architecture. The use of P2P...
Raymond Sweha, Vatche Ishakian, Azer Bestavros
OIR
2011
401views Neural Networks» more  OIR 2011»
12 years 10 months ago
Using Online Collaborative Tools for Groups to Co-Construct Knowledge
(limit 250 words) Purpose This paper reports and describes the use of MediaWiki and Google Docs at undergraduate level as online collaboration tools for co-constructing knowledge i...
Sam Kai Wah Chu, David M. Kennedy
IJACTAICIT
2010
155views more  IJACTAICIT 2010»
13 years 4 months ago
Constructive Dynamic Program Slicing Research
Program slicing is a promising technique for providing automated support for various important software engineering activities. There exists hundreds of scientific studies on the ...
Jaakko Korpi, Jussi Koskinen
HCI
2009
13 years 5 months ago
ImproV: A System for Improvisational Construction of Video Processing Flow
ImproV is a video compositing system for live video. It uses a dataflow diagram to represent the video processing flow and allows performers to edit the diagrams even while the vid...
Atsutomo Kobayashi, Buntarou Shizuki, Jiro Tanaka