Sciweavers

298 search results - page 35 / 60
» UPPAAL - Now, Next, and Future
Sort
View
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
14 years 27 days ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
PKDD
2005
Springer
164views Data Mining» more  PKDD 2005»
14 years 27 days ago
Clustering and Prediction of Mobile User Routes from Cellular Data
Location-awareness and prediction of future locations is an important problem in pervasive and mobile computing. In cellular systems (e.g., GSM) the serving cell is easily availabl...
Kari Laasonen
ACMSE
2004
ACM
14 years 25 days ago
Recent advances in mobility modeling for mobile ad hoc network research
In this paper, we survey recent advances in mobility modeling for mobile ad hoc network research. The advances include some new mobility models and analysis of older mobility mode...
Qunwei Zheng, Xiaoyan Hong, Sibabrata Ray
GRAPHITE
2004
ACM
14 years 25 days ago
Handheld devices for applications using dynamic multimedia data
Growing demand for ubiquitous and pervasive computing has triggered a sharp rise in handheld device usage. At the same time, dynamic multimedia data has become accepted as core ma...
Binh Pham, On Wong
ISW
2004
Springer
14 years 23 days ago
Survey on the Technological Aspects of Digital Rights Management
Abstract. Digitalization of content is both a blessing and a curse. While it allows for efficient transmission and consumption, the ease of copying and sharing digital content has ...
William Ku, Chi-Hung Chi