Sciweavers

185 search results - page 31 / 37
» Simulation for computer science majors: a preliminary report
Sort
View
PEWASUN
2004
ACM
14 years 24 days ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ICS
2003
Tsinghua U.
14 years 17 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
LICS
2003
IEEE
14 years 19 days ago
Labelled Markov Processes: Stronger and Faster Approximations
This paper reports on and discusses three notions of approximation for Labelled Markov Processes that have been developed last year. The three schemes are improvements over former...
Vincent Danos, Josee Desharnais
CSE
2009
IEEE
14 years 2 days ago
Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor Networks
—In this paper we propose a clustering and routing scheme for wireless sensor networks based on a self-organizing approach. The aim of this approach is for nodes to perform an in...
Ehssan Sakhaee, Naoki Wakamiya, Masayuki Murata
TROB
2008
154views more  TROB 2008»
13 years 7 months ago
Dynamic Performance of Mobile Haptic Interfaces
Abstract--The increasing demand for virtual reality applications in several scientific disciplines feeds new research perspectives dealing with robotics, automation, and computer s...
Alessandro Formaglio, Domenico Prattichizzo, Feder...