Sciweavers

1039 search results - page 111 / 208
» networks 1998
Sort
View
NDSS
1998
IEEE
14 years 1 months ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just
NDSS
1998
IEEE
14 years 1 months ago
Credential Management and Secure Single Login for SPKM
The GSS-API [20, 21] offers security services independent of underlying mechanisms. A possible GSS-mechanism is the Simple Public Key Mechanism (SPKM) specified in [1]. In this pa...
Detlef Hühnlein
NN
1998
Springer
117views Neural Networks» more  NN 1998»
13 years 8 months ago
Neural learning of embodied interaction dynamics
This paper presents our approach towards realizing a robot which can bootstrap itself towards higher complexity through embodied interaction dynamics with the environment includin...
Yasuo Kuniyoshi, Luc Berthouze
HPN
1997
13 years 10 months ago
Mobiware: QoS-aware middleware for mobile multimedia communications
Next generation wireless communications system will be required to support the seamless delivery of voice, video and data with high quality. Delivering hard Quality of Service (QO...
Andrew T. Campbell
IBMSJ
1998
81views more  IBMSJ 1998»
13 years 8 months ago
T Spaces
Millions of small heterogeneous computers are poised to spread into the infrastructure of our society. Though mostly inconspicuous today, disguised as nothing more than PIM (perso...
Peter Wyckoff, Stephen W. McLaughry, Tobin J. Lehm...