Sciweavers

2024 search results - page 314 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
COMCOM
2006
121views more  COMCOM 2006»
15 years 4 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
ISCAS
2006
IEEE
160views Hardware» more  ISCAS 2006»
15 years 10 months ago
Address-event image sensor network
We describe a sensor network based on smart requirements of the network. This will provide a new approach imager sensors able to extract events of interest from a scene. for compos...
Eugenio Culurciello, Andreas Savvides
ISQED
2007
IEEE
206views Hardware» more  ISQED 2007»
15 years 11 months ago
Provisioning On-Chip Networks under Buffered RC Interconnect Delay Variations
Abstract—A Network-on-Chip (NoC) replaces on-chip communication implemented by point-to-point interconnects in a multi-core environment by a set of shared interconnects connected...
Mosin Mondal, Tamer Ragheb, Xiang Wu, Adnan Aziz, ...
AAAI
2006
15 years 6 months ago
Real-Time Evolution of Neural Networks in the NERO Video Game
A major goal for AI is to allow users to interact with agents that learn in real time, making new kinds of interactive simulations, training applications, and digital entertainmen...
Kenneth O. Stanley, Bobby D. Bryant, Igor Karpov, ...
CCS
2007
ACM
15 years 11 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik