نتایج جستجو برای: communicational
تعداد نتایج: 723 فیلتر نتایج به سال:
Original scientific article High performance routers are fundamental building blocks of the system wide interconnection networks for high performance computing systems. Through collective interaction they provide reliable communication between the computing nodes and manage the communicational dataflow. The development process of specialized router architecture has high complexity and it requir...
The Residue Number System (RNS) is a non-weighted system that is very efficient in digital signal processing and communicational applications. The previous proposed methods for the residue to binary (R/B) conversions are based on the Chinese Reminder Theorem (CRT) or Mixed Radix Conversion (MRC). These theorems are difficult to implement. In this paper, we present a new highspeed ROM-less resid...
We study client-to-client password-authenticated key exchange (C2C-PAKE) enabling two clients in different realms to agree on a common session key using different passwords. Byun et al. first presented C2C-PAKE schemes under the cross-realm setting. However, the schemes were not formally treated, and subsequently found to be flawed. In addition, in the schemes, there are still rooms for improve...
Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based priva...
The expectations of emotional displays play an important role in human-human and human-robot interaction in order to achieve a constructive interaction. However, as we argue in this position paper, current state-of-the-art social robotic models of emotion still neglect the communicational aspects of emotions. Based on different psychological models of emotion, we argue that an intra-personal ac...
In this paper, we propose a new Robust Delegation Signcrypted Authentication Protocol (RD-SAP) against the False Home Location Register Attack in 3GPP. The proposed authentication protocol is based on Public Key Signcryption technique to solve the problem of FHLR attack on Tian F Lee protocol and which provides the user identity privacy, mutual authentication, nonrepudiation. This study also pr...
The use of pictograms is discussed considering their information content, graphic complexity and cultural dimension. The resemblance and the illusion theories are highlighted to define pictogram as a salience-based representation system, which communicational efficacy depends upon historical and cultural aspects in their interpretation. Thus, the competence in interpreting pictograms is conside...
In this article, a single application is suggested to determine the position of vehicles using Geographical Information Systems (GIS) and Geographical Position Systems (GPS). The part of the article material included mapping three dimensional coordinates to two dimensional coordinates using UTM or LAMBERT geographical methods, and the algorithm of conversion of GPS information into GIS maps is ...
Compared to more common media of communication such as telephone or e−mail, video conferences (VCs) provide further communicational resources for the interactants by allowing for visual cues that are suspected to play a major role in discourse management, cognitive and affective processing. Video−conferencing furthermore has a number of practical advantages compared to real meetings, such as th...
“Socio-Semantic Web”(S2W) applications, such as “Knowledge-Based MarketPlaces” (KBMs), lead to co-construct symbolic organizational artifacts including “maps” or others semantic instruments, bringing a visibility and a reflexivity of the knowledge and of the action in communities. In presenting and comparing examples of KBMs, we note that the creation and the whole lifecycle of such S2W applica...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید