Sciweavers

761 search results - page 66 / 153
» Reverse engineering MAC
Sort
View
ADHOCNOW
2008
Springer
13 years 9 months ago
A Prediction Based Cross-Layer MAC/PHY Interface for CDMA Ad Hoc Networks
Variable environments in ad hoc networks require a joint control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. In this paper,...
Pegdwindé Justin Kouraogo, François ...
COMPSAC
2006
IEEE
14 years 2 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
COBUILD
1999
Springer
14 years 11 days ago
The Aware Home: A Living Laboratory for Ubiquitous Computing Research
We are building a home, called the Aware Home, to create a living laboratory for research in ubiquitous computing for everyday activities. This paper introduces the Aware Home proj...
Cory D. Kidd, Robert Orr, Gregory D. Abowd, Christ...
AC
1997
Springer
14 years 8 days ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
TVCG
2012
184views Hardware» more  TVCG 2012»
11 years 10 months ago
Spherical DCB-Spline Surfaces with Hierarchical and Adaptive Knot Insertion
—This paper develops a novel surface fitting scheme for automatically reconstructing a genus-0 object into a continuous parametric spline surface. A key contribution for making ...
Juan Cao, Xin Li, Zhonggui Chen, Hong Qin