Sciweavers

617 search results - page 66 / 124
» Research Challenges for the Security of Control Systems
Sort
View
CSFW
2007
IEEE
14 years 3 months ago
Secure Implementations for Typed Session Abstractions
mplementations for Typed Session Abstractions Ricardo Corin1,2,3 Pierre-Malo Deni´elou1,2 C´edric Fournet1,2 Karthikeyan Bhargavan1,2 James Leifer1 1 MSR-INRIA Joint Centre 2 Mic...
Ricardo Corin, Pierre-Malo Deniélou, C&eacu...
SPEECH
2010
208views more  SPEECH 2010»
13 years 4 months ago
Silent speech interfaces
The possibility of speech processing in the absence of an intelligible acoustic signal has given rise to the idea of a `silent speech' interface, to be used as an aid for the...
Bruce Denby, Thomas Schultz, Kiyoshi Honda, Thomas...
MOBICOM
2009
ACM
14 years 3 months ago
A quorum-based framework for establishing control channels in dynamic spectrum access networks
Establishing a control channel for medium access control is a challenging problem in multi-channel and dynamic spectrum access (DSA) networks. In the design of multi-channel MAC p...
Kaigui Bian, Jung Min Park, Ruiliang Chen
PERCOM
2007
ACM
14 years 8 months ago
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment
? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
ICN
2007
Springer
14 years 3 months ago
Design Issues of Peer-to-Peer Systems for Wireless Ad Hoc Networks
– Peer-to-peer is a popular distributed system. Mobile ad hoc networks and peer-to-peer file sharing systems both lack fixed infrastructure support and hold no a-priori knowledge...
Dewan Tanvir Ahmed, Shervin Shirmohammadi