Sciweavers

236 search results - page 35 / 48
» P2CA: How Much Face Information is Needed
Sort
View
IEEEIAS
2008
IEEE
14 years 1 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
SCHULE
2001
Springer
13 years 11 months ago
Co-operative ICT-supported learning. A practical approach to design
Abstract: Education is changing, following changes in society. The focus is shifting from teaching towards learning. And Informatics, more particularly Information and Communicatio...
Tom J. van Weert
DAC
1999
ACM
14 years 7 months ago
A Novel VLSI Layout Fabric for Deep Sub-Micron Applications
We propose a new VLSI layout methodology which addresses the main problems faced in Deep Sub-Micron (DSM) integrated circuit design. Our layout "fabric" scheme eliminate...
Sunil P. Khatri, Amit Mehrotra, Robert K. Brayton,...
VLSID
2001
IEEE
144views VLSI» more  VLSID 2001»
14 years 7 months ago
Next Generation Network Processors
Networking hardware manufacturers face the dual demands of supporting ever increasing bandwidth requirements, while also delivering new features, such as the ability to implement ...
Deepak Kataria
ASIACRYPT
2003
Springer
13 years 12 months ago
Leakage-Resilient Authenticated Key Establishment Protocols
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we revi...
SeongHan Shin, Kazukuni Kobara, Hideki Imai