Sciweavers

1490 search results - page 281 / 298
» The Logic of Authentication Protocols
Sort
View
COMSWARE
2006
IEEE
14 years 1 months ago
Separating control software from routers
Abstract— Control software in routers have gotten increasingly complex today. Further, since the control software runs in every router, managing a large network of routers is com...
Ramachandran Ramjee, Furquan Ansari, Martin Havema...
IAT
2005
IEEE
14 years 1 months ago
Real-time Cooperative Multi-target Tracking by Dense Communication among Active Vision Agents
We have proposed a real-time multi-target tracking system by cooperative behaviors of Active Vision Agents (AVAs), where an AVA is a logical model of a networkconnected computer w...
Norimichi Ukita
ISCAS
2005
IEEE
154views Hardware» more  ISCAS 2005»
14 years 1 months ago
HIBI-based multiprocessor SoC on FPGA
Abstract — FPGAs offer excellent platform for System-onChips consisting of Intellectual Property (IP) blocks. The problem is that IP blocks and their interconnections are often F...
Erno Salminen, Ari Kulmala, Timo D. Hämä...
ISM
2005
IEEE
127views Multimedia» more  ISM 2005»
14 years 1 months ago
Distributed User Interface Elements to support Smart Interaction Spaces
In this paper we show how an interactive system can be distributed among several peer devices. By taking advantage of the current trend towards ambient intelligent environments, w...
Kris Luyten, Karin Coninx
TIME
2005
IEEE
14 years 1 months ago
LOLA: Runtime Monitoring of Synchronous Systems
Abstract— We present a specification language and algorithms for the online and offline monitoring of synchronous systems including circuits and embedded systems. Such monitori...
Ben D'Angelo, Sriram Sankaranarayanan, Césa...