Sciweavers

5247 search results - page 11 / 1050
» The Generalized A* Architecture
Sort
View
ISWC
1999
IEEE
14 years 2 months ago
Virtual Information Towers-A Metaphor for Intuitive, Location-Aware Information Access in a Mobile Environment
This paper introduces Virtual Information Towers (VITs) as a concept for presenting and accessing location-aware information with mobile clients. A VIT is a means of structuring l...
Alexander Leonhardi, Uwe Kubach, Kurt Rothermel, A...
MTA
2002
103views more  MTA 2002»
13 years 9 months ago
STEPS: Supporting Traditional Education Procedures-A TCP/IP Multimedia Networks-Based Model
This paper describes an integrated model for the realization of an Open and Distance Learning (ODL) environment supporting traditional learning procedures, through collaborative le...
Christos Bouras, Petros Lampsas, Paul G. Spirakis
VLSID
2002
IEEE
122views VLSI» more  VLSID 2002»
14 years 10 months ago
IEEE 1394a_2000 Physical Layer ASIC
CN4011A is IEEE 1394a_2000 standard Compliant Physical Layer ASIC. It is a 0.18um mixed-signal ASIC incorporating three analog ports, PLL, reference generator for analog along wit...
Ranjit Yashwante, Bhalchandra Jahagirdar
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
13 years 11 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 4 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp