Sciweavers

9659 search results - page 1807 / 1932
» Points on Computable Curves
Sort
View
CHI
2010
ACM
14 years 2 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
AINA
2003
IEEE
14 years 2 months ago
A Safe Multiple Access-Rates Transmission (SMART) Scheme for IEEE 802.11 Wireless Networks
Abstract— The IEEE 802.11 standard and enhanced amendments have defined fourteen transmission rates (1/2/5.5/6/9/11/12/ 18/22/24/33/36/48/54 Mb/s) for mobile stations to transmi...
Shiann-Tsong Sheu, Jenhui Chen, Hsueh-Wen Tseng, H...
DSN
2003
IEEE
14 years 2 months ago
Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy Techniques
The presence of physical obstacles and radio interference results in the so called “shadow regions” in wireless networks. When a mobile station roams into a shadow region, it ...
Dongyan Chen, Sachin Garg, Chandra M. R. Kintala, ...
PG
2003
IEEE
14 years 2 months ago
Automatic Animation Skeleton Construction Using Repulsive Force Field
A method is proposed in this paper to automatically generate the animation skeleton of a model such that the model can be manipulated according to the skeleton. With our method, u...
Pin-Chou Liu, Fu-Che Wu, Wan-Chun Ma, Rung-Huei Li...
DAC
2003
ACM
14 years 2 months ago
Crosstalk noise in FPGAs
In recent years, due to rapid advances in VLSI manufacturing technology capable of packing more and more devices and wires on a chip, crosstalk has emerged as a serious problem af...
Yajun Ran, Malgorzata Marek-Sadowska
« Prev « First page 1807 / 1932 Last » Next »