Sciweavers

1653 search results - page 206 / 331
» Timed analysis of security protocols
Sort
View
IJPP
2008
148views more  IJPP 2008»
13 years 10 months ago
Analysis and Optimisation of Hierarchically Scheduled Multiprocessor Embedded Systems
We present an approach to the analysis and optimisation of heterogeneous multiprocessor embedded systems. The systems are heterogeneous not only in terms of hardware components, b...
Traian Pop, Paul Pop, Petru Eles, Zebo Peng
NETWORKING
2007
13 years 11 months ago
Performance and Equilibrium Analysis of Heterogeneous IEEE 802.11 Based WLANs
This paper presents a general model to study the medium access control (MAC) layer performance and equilibrium of WLANs consisting of nodes with different MAC parameters (e.g., ba...
Hao Zhu
MICCAI
2004
Springer
14 years 11 months ago
Bone Motion Analysis from Dynamic MRI: Acquisition and Tracking
For diagnosis, preoperative planning and postoperative guides, an accurate estimate of joints kinematics is required. We bring together MRI developments and new image processing me...
Benjamin Gilles, Rosalind Perrin, Nadia Magnenat-T...
IROS
2006
IEEE
115views Robotics» more  IROS 2006»
14 years 4 months ago
An Analysis of Random Peer-to-Peer Communication for System-Level Coordination in Decentralized Multiple-Robot Systems
— Inter-robot communication is essential if general purpose intelligent decentralized multiple-robot systems are to become a reality. Traditionally, explicit communication amongs...
Chris A. C. Parker, Hong Zhang
WICON
2008
13 years 11 months ago
Using the EAP framework for fast media independent handover authentication
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...