Sciweavers

1721 search results - page 109 / 345
» On Active and Passive Testing
Sort
View
145
Voted
NDSS
1998
IEEE
15 years 8 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
IIE
2008
149views more  IIE 2008»
15 years 4 months ago
Information Technologies for Biology Education: Computerized Electrophysiology of Plant Cells
Abstract. Biology has moved from a bench-based discipline to a bioinformational science in modern times but application of computational and analytical methods of informatics in it...
Vilma Kisnieriene, Kastytis Beitas, Vidmantas Saka...
NN
2006
Springer
100views Neural Networks» more  NN 2006»
15 years 4 months ago
Perceiving the unusual: Temporal properties of hierarchical motor representations for action perception
Recent computational approaches to action imitation have advocated the use of hierarchical representations in the perception and imitation of demonstrated actions. Hierarchical re...
Yiannis Demiris, Gavin Simmons
INFOCOM
2010
IEEE
15 years 3 months ago
Deterministic Broadcast on Multiple Access Channels
—We study broadcasting on multiple access channels by deterministic distributed protocols. Data arrivals are governed by an adversary. The power of the adversary is constrained b...
Lakshmi Anantharamu, Bogdan S. Chlebus, Dariusz R....
163
Voted
SECON
2010
IEEE
15 years 2 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das