Sciweavers

12459 search results - page 182 / 2492
» cans 2006
Sort
View
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
15 years 8 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
CSREAPSC
2006
15 years 5 months ago
An Inexact Matching Method Based on Ontology and Semantic Distance for Resource Discovery and Interaction
- To overcome shortcomings of Exact Matching Method (EMM) and Substitute Description Method (SDM), an Inexact Matching Method Based on Ontology and Semantic Distance (OSDIMM) is in...
Tang Shancheng, Qian Yi, Wang Wei
CSREAPSC
2006
15 years 5 months ago
Modelling Application Handovers For Thin-Client Mobility
Mobile users need lightweight devices with low energy consumption. When applications are executed on remote servers instead of locally on the end-user's device, the weight of...
Pieter Simoens, Lien Deboosere, Davy De Winter, Fi...
EUMAS
2006
15 years 5 months ago
E*plore-ing the Simulation Design Space
One of the major puzzles in performing multi-agent-based simulations is the validity of their results. Optimisation of simulation parameters can lead to results that can be deceit...
Luis Antunes, Helder Coelho, João Balsa
IEICET
2006
114views more  IEICET 2006»
15 years 4 months ago
Synchronization Verification in System-Level Design with ILP Solvers
Concurrency is one of the most important issues in system-level design. Interleaving among parallel processes can cause an extremely large number of different behaviors, making de...
Thanyapat Sakunkonchak, Satoshi Komatsu, Masahiro ...