Sciweavers

1583 search results - page 284 / 317
» Probabilistic User Behavior Models
Sort
View
PKC
2012
Springer
219views Cryptology» more  PKC 2012»
11 years 10 months ago
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
We identify a potential weakness in the standard security model for dynamic group signatures which appears to have been overlooked previously. More specifically, we highlight tha...
Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Go...
RTAS
2008
IEEE
14 years 2 months ago
A Modular Worst-case Execution Time Analysis Tool for Java Processors
Recent technologies such as the Real-Time Specification for Java promise to bring Java’s advantages to real-time systems. While these technologies have made Java more predictab...
Trevor Harmon, Martin Schoeberl, Raimund Kirner, R...
DSRT
2005
IEEE
14 years 1 months ago
A Simple Distributed Simulation Architecture for Emergency Response Exercises
This paper describes a simple distributed simulation for support of emergency response exercises. The simulation, called the Immersive Synthetic Environment for Exercises (ISEE), ...
Dennis McGrath, Amy Hunt, Marion Bates
IWQOS
2004
Springer
14 years 1 months ago
Enhancing mobile QoS based on movement contracts
Abstract— Resource management for individual flows can significantly improve quality of service (QoS) in mobile cellular networks. However, its efficiency depends on the avail...
Frank A. Zdarsky, Jens B. Schmitt
DATE
2010
IEEE
192views Hardware» more  DATE 2010»
14 years 22 days ago
PhoenixSim: A simulator for physical-layer analysis of chip-scale photonic interconnection networks
—Recent developments have shown the possibility of leveraging silicon nanophotonic technologies for chip-scale interconnection fabrics that deliver high bandwidth and power effi...
Johnnie Chan, Gilbert Hendry, Aleksandr Biberman, ...