Sciweavers

163 search results - page 28 / 33
» adhoc 2004
Sort
View
ESAS
2004
Springer
14 years 3 months ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko
EUROPAR
2004
Springer
14 years 3 months ago
OLAP Query Processing in a Database Cluster
OLAP queries are typically heavy-weight and ad-hoc thus requiring high storage capacity and processing power. In this paper, we address this problem using a database cluster which...
Alexandre A. B. Lima, Marta Mattoso, Patrick Valdu...
FC
2004
Springer
94views Cryptology» more  FC 2004»
14 years 3 months ago
The Ephemeral Pairing Problem
Abstract In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not...
Jaap-Henk Hoepman
GECCO
2004
Springer
14 years 3 months ago
Experimental Evaluation of Discretization Schemes for Rule Induction
This paper proposes an experimental evaluation of various discretization schemes in three different evolutionary systems for inductive concept learning. The various discretization...
Jesús S. Aguilar-Ruiz, Jaume Bacardit, Fede...
ICDCIT
2004
Springer
14 years 3 months ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner