Sciweavers

1449 search results - page 197 / 290
» Time Synchronization
Sort
View
SEC
2007
13 years 10 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
DGO
2003
151views Education» more  DGO 2003»
13 years 10 months ago
COPLINK: Visualization for Crime Analysis
We have applied various visualization techniques to assist crime analysis. These techniques include a hierarchical list, a hyperbolic tree, a time line tool, a periodic pattern to...
Hsinchun Chen, Homa Atabakhsh, Tim Petersen, Jenni...
WEBNET
2001
13 years 10 months ago
Designing a Collaboration Environment for Teleworkers
: Teleworking enables a more flexible scheduling of working time and places of work on the way to the modern information society. The rapid development of cooperative application s...
Iris Braun, Ulf Zschuckelt
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 9 months ago
Modified Bully Algorithm using Election Commission
-- Electing leader is a vital issue not only in distributed computing but also in communication network [1, 2, 3, 4, 5], centralized mutual exclusion algorithm [6, 7], centralized ...
Muhammad Mahbubur Rahman, Afroza Nahar
IJON
2002
78views more  IJON 2002»
13 years 9 months ago
External termination of recurrent bursting in a model of connected local neural sub-networks
Epileptic seizures are characterized by repetitive synchronous neuronal bursting activity. To study external influences on this activity, a simple model of a chain loop of neurona...
Pawel Kudela, Piotr J. Franaszczuk, Gregory K. Ber...