Sciweavers

648 search results - page 48 / 130
» The GCHQ Protocol and Its Problems
Sort
View
ESORICS
2012
Springer
11 years 11 months ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
ITS
2010
Springer
149views Multimedia» more  ITS 2010»
13 years 10 months ago
How Adaptive Is an Expert Human Tutor?
In examine the tutoring protocols of one expert human tutor tutoring 10 students in solving physics problems, four analyses reveal that he tutored the five good learners in differe...
Michelene T. H. Chi, Marguerite Roy
JSW
2007
115views more  JSW 2007»
13 years 8 months ago
Modeling Network Behaviour By Full-System Simulation
— Due to the network technology advances, an order-of-magnitude jump has been produced in the network bandwidth. This fact has returned to wake up the interest on protocol offloa...
Andrés Ortiz, Julio Ortega, Antonio F. D&ia...
INFOCOM
1998
IEEE
14 years 28 days ago
Timer Reconsideration for Enhanced RTP Scalability
RTP, the Real Time Transport Protocol, has gained widespread acceptance as the transport protocol for voice and video on the Internet. Its companion control protocol, the Real Tim...
Jonathan Rosenberg, Henning Schulzrinne
MKM
2009
Springer
14 years 3 months ago
OpenMath in SCIEnce: SCSCP and POPCORN
In this short communication we want to give an overview of how OpenMath is used in the European project “SCIEnce” [12]. The main aim of this project is to allow unified commun...
Peter Horn, Dan Roozemond