Sciweavers

297 search results - page 41 / 60
» Towards a Parallel Search for Solutions of Non-deterministic...
Sort
View
PDP
2008
IEEE
14 years 2 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
IPPS
2007
IEEE
14 years 2 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
IPPS
2007
IEEE
14 years 2 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
IPPS
2005
IEEE
14 years 2 months ago
Configuration Steering for a Reconfigurable Superscalar Processor
An architecture for a reconfigurable superscalar processor is described in which some of its execution units are implemented in reconfigurable hardware. The overall configuration ...
Brian F. Veale, John K. Antonio, Monte P. Tull
PPSN
2004
Springer
14 years 1 months ago
Group Transport of an Object to a Target That Only Some Group Members May Sense
This paper addresses the cooperative transport of a heavy object, called prey, towards a sporadically changing target location by a group of robots. The study is focused on the sit...
Roderich Groß, Marco Dorigo