Sciweavers

15375 search results - page 189 / 3075
» cans 2008
Sort
View
IJNSEC
2008
81views more  IJNSEC 2008»
13 years 8 months ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh
IJNSEC
2008
90views more  IJNSEC 2008»
13 years 8 months ago
Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences
In this paper, two classes of generalized cyclotomic sequences of period pq are reconstructed by means of multirate parallel combinations of binary Legendre sequences which are cl...
Tongjiang Yan, Xiaoni Du, Shuqing Li, Guozhen Xiao
IJVR
2008
130views more  IJVR 2008»
13 years 8 months ago
An Example of Virtual Environment and Web-based Application in Learning
Due to its importance as a model for several software and hardware applications, automata theory is a core topic in computer science and engineering education. But because of its m...
Mohamed Hamada
IJVR
2008
127views more  IJVR 2008»
13 years 8 months ago
Embodied Tutors for Interaction Skills Simulation Training
This paper describes intelligent virtual tutors for interaction skills training who can serve the roles of demonstrator, coach, trainer, mentor, and observer. These roles meet the ...
Robert Hubal
INFFUS
2008
119views more  INFFUS 2008»
13 years 8 months ago
A scalable correlation aware aggregation strategy for wireless sensor networks
Sensors-to-sink data in wireless sensor networks (WSNs) are typically correlated with each other. Exploiting such correlation when performing data aggregation can result in consid...
Yujie Zhu, Ramanuja Vedantham, Seung-Jong Park, Ra...