Sciweavers

97 search results - page 13 / 20
» Some Considerations on the Reason for Bloat
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Base line performance measurements of access controls for libraries and modules
Having reliable security in systems is of the utmost importance. However, the existing framework of writing, distributing and linking against code in the form of libraries and/or ...
Jason W. Kim, Vassilis Prevelakis
LCN
2006
IEEE
14 years 1 months ago
Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks
Security has become a major concern for many realworld applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all th...
Martin Passing, Falko Dressler
SAC
2006
ACM
14 years 1 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
CPAIOR
2005
Springer
14 years 1 months ago
Computing Explanations for the Unary Resource Constraint
Integration of explanations into a CSP solver is a technique addressing difficult question “why my problem has no solution”. Moreover, explanations together with advanced searc...
Petr Vilím
ROBOCUP
2004
Springer
85views Robotics» more  ROBOCUP 2004»
14 years 1 months ago
Optimizing Precision of Self-Localization in the Simulated Robotics Soccer
We show that all published visual data processing methods for the simulated robotic soccer so far were not utilizing all available information, because they were mainly based on he...
Vadim Kyrylov, David Brokenshire, Eddie Hou