Sciweavers

2484 search results - page 377 / 497
» Polymatroids with Network Coding
Sort
View
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
DAC
2009
ACM
14 years 2 months ago
Endosymbiotic computing: enabling surrogate GUI and cyber-physical connectivity
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Pai H. Chou
PERVASIVE
2009
Springer
14 years 2 months ago
Inferring Identity Using Accelerometers in Television Remote Controls
Abstract. We show that accelerometers embedded in a television remote control can be used to distinguish household members based on the unique way each person wields the remote. Th...
Keng-hao Chang, Jeffrey Hightower, Branislav Kveto...
ICC
2009
IEEE
169views Communications» more  ICC 2009»
14 years 2 months ago
Protocols and Resource Allocation for the Two-Way Relay Channel with Half-Duplex Terminals
—The two-way relay channel (TWRC) describes the communication between two terminals sharing a common relay. In this work we compare different protocols for the TWRC with a half-d...
Adrian Agustin, Josep Vidal, Olga Muñoz
RTAS
2009
IEEE
14 years 2 months ago
Partial Program Admission
Abstract—Real-time systems on non-preemptive platforms require a means of bounding the execution time of programs for admission purposes. Worst-Case Execution Time (WCET) is most...
Michael Wilson, Ron Cytron, Jonathan S. Turner