Sciweavers

3089 search results - page 454 / 618
» services 2008
Sort
View
98
Voted
IJBC
2008
87views more  IJBC 2008»
15 years 3 months ago
Digital Secure-Communication Using Robust Hyper-Chaotic Systems
Abstract-- In this paper, we propose a robust hyperchaotic system that is practically serviceable in digital securecommunication. The system consists of many coupled robust logisti...
Shih-Liang Chen, Shu-Ming Chang, Wen-Wei Lin, Ting...
117
Voted
IJHPCA
2008
96views more  IJHPCA 2008»
15 years 3 months ago
BlueGene/L applications: Parallelism On a Massive Scale
pc.sagepub.com/cgi/content/abstract/22/1/33 The online version of this article can be found at: Published by: http://www.sagepublications.com can be found at:International Journal ...
Bronis R. de Supinski, Martin Schulz, Vasily Bulat...
111
Voted
IJIPT
2008
81views more  IJIPT 2008»
15 years 3 months ago
Towards seamless source mobility in SSM: design and evaluation of the Tree Morphing protocol
: Multimedia networking in the near future is expected to be dominated by group applications such as IPTV, MMORPGs, and video conferencing. Hand in hand with new service offers, th...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
106
Voted
IJNSEC
2008
88views more  IJNSEC 2008»
15 years 3 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
185
Voted
IJNSEC
2008
140views more  IJNSEC 2008»
15 years 3 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp