Sciweavers

17932 search results - page 3437 / 3587
» Wireless communications systems
Sort
View
CSFW
2012
IEEE
12 years 1 months ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 5 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
COCO
2003
Springer
118views Algorithms» more  COCO 2003»
14 years 4 months ago
Lower bounds for predecessor searching in the cell probe model
We consider a fundamental problem in data structures, static predecessor searching: Given a subset S of size n from the universe [m], store S so that queries of the form “What i...
Pranab Sen
INTEGRATION
2008
183views more  INTEGRATION 2008»
13 years 10 months ago
Network-on-Chip design and synthesis outlook
With the growing complexity in consumer embedded products, new tendencies forecast heterogeneous Multi-Processor SystemsOn-Chip (MPSoCs) consisting of complex integrated component...
David Atienza, Federico Angiolini, Srinivasan Mura...

Publication
293views
15 years 8 months ago
Using Archived Data to Generate Transit Performance Measures.
Measuring the performance of a transit system is the first step toward efficient and proactive management. In recent years, the use of performance measures for transportation plan...
R. L. Bertini, A. M. El-Geneidy
« Prev « First page 3437 / 3587 Last » Next »