Filters








5,223 Hits in 5.2 sec

Design and Implementation of Concurrent C0

Max Willsey, Rokhini Prabhu, Frank Pfenning
2017 Electronic Proceedings in Theoretical Computer Science  
We describe Concurrent C0, a type-safe C-like language with contracts and session-typed communication over channels.  ...  The language's type system enables elegant expression of session types and message-passing concurrent programs.  ...  It uses session typing to guarantee the safety of communication and also to alleviate the burden of manually synchronizing bidirectional communication [3, 5, 9] .  ... 
doi:10.4204/eptcs.238.8 fatcat:g4rdyu4rsrg7dj2awzsk4ar7j4

The benefits of learning movement sequences in social interactions

Guy Nahardiya, Andrey Markus, Rotem Bennet, Simone G. Shamay-Tsoory
2022 Frontiers in Psychology  
This suggests that dyadic interaction is important for learning movement sequences, and that bidirectional communication of signals and mutual feedback are essential for the consolidation of motor learning  ...  In the first session, the IBL group, but not the OL group, showed a significant improvement in synchronization.  ...  , as well as Liron Paradis and Bella Sade in data coding.  ... 
doi:10.3389/fpsyg.2022.901900 pmid:36017441 pmcid:PMC9396234 fatcat:rof7hk4ez5cajbs6corcdiixle

Key Swap Over among Group of Multilayerperceptrons for Encryption in Wireless Communication (KSOGMLPE)

Arindam Sarkar, Mandal J.K
2013 International Journal of Information Technology Control and Automation  
Since in this case each communicating party has to synchronize with other for swapping over the key.  ...  Two parties can swap over a common key using synchronization between their own multilayer perceptrons. But the problem crop up when group of N parties desire to swap over a key.  ...  An attacker can take part in the protocol and synchronize with the group and finally obtain the shared key which endangers the secret communication between the group later.  ... 
doi:10.5121/ijitca.2013.3107 fatcat:glnofauywrftvadegh2lclyhyu

Cryptanalysis of Key Exchange method in Wireless Communication

Arindam Sarkar, Jyotsna Kumar Mandal
2015 International Journal of Network Security  
In this proposed CKE technique both sender and receiver uses an identical multilayer perceptrons for synchronization between them.  ...  After achieving the full synchronization weights vectors of both the parties' becomes identical and this identical weight vector is used as a secret session key for encryption/decryption.  ...  Hidden Layer as a Secret Session Key At end of full weight synchronization process, weight vectors between input layer and activated hidden layer of both multilayer perceptron systems become identical.  ... 
dblp:journals/ijnsec/SarkarM15 fatcat:qscewv254vdsxfxqopyvujeqk4

Design considerations of expressive bidirectional telepresence robots

Ji-Dong Yim, Chris D. Shaw
2011 Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems - CHI EA '11  
In this paper, we present our iterative design approach toward an interactive bidirectional robot intermediaries along with application ideas and design considerations.  ...  The findings for bidirectional telepresence robot interfaces are of: synchronicity, robot's role, intelligence, personalization, and personality construction method.  ...  Figure 2 . 2 A comparison of interactions between teleoperation (top) and bidirectional telepresence (bottom) Figure 3 . 3 One of the paper masks we used for participatory design session.  ... 
doi:10.1145/1979742.1979633 dblp:conf/chi/YimS11 fatcat:ehxjcwja2fe63evx5hl4pbgpyu

Multilayer neural network synchronized secured session key based encryption in wireless communication

Arindam Sarkar
2019 IAES International Journal of Artificial Intelligence (IJ-AI)  
In this paper, multilayer neural network synchronized session key based encryption has been proposed for wireless communication of data/information.  ...  Receiver will use identical multilayer perceptron generated session key for performing deciphering process for getting the plain text.  ...  PROBLEM DOMAIN AND METHODOLOGY In security based communication the main problem is distribution of key between sender and receiver.  ... 
doi:10.11591/ijai.v8.i1.pp44-53 fatcat:lr7hcv5525cr7p2cwvcarigsgq

Bidirectional Transformations: A Cross-Discipline Perspective [chapter]

Krzysztof Czarnecki, J. Nathan Foster, Zhenjiang Hu, Ralf Lämmel, Andy Schürr, James F. Terwilliger
2009 Lecture Notes in Computer Science  
The meeting brought together researchers and practitioners from a variety of subdisciplines of computer science to share research efforts and help create a new community.  ...  We also describe some insights gathered from our discussions and introduce a new effort to establish a benchmark for bidirectional transformations.  ...  Transformation vs. synchronization A hotly-debated topic was the distinction between transformation and synchronization.  ... 
doi:10.1007/978-3-642-02408-5_19 fatcat:wkbln73w3jefhagbj63rhtqt5a

XGFX: eXtensible Game Framework through XMPP

Aditya Borikar
2019 International Journal of Computer Applications  
These XEPs allow developers to develop a generic middleware between gaming servers and gaming stations using XEPs such as publish/subscribe (pubsub), group management and Jingle.  ...  The concept introduced is meant to operate between client and server enabling data transmission through multiple servers hosting different domain-name similar to emails.  ...  [17] XEP-0124 Bidirectional- streams Over Synchronous HTTP (BOSH) Uses multiple synchronous HTTP request/response pairs without requiring polling and emulates the semantic of TCP connection  ... 
doi:10.5120/ijca2019919434 fatcat:e2hesqoz45ds3eir7kktp7w4xa

Service-oriented high level architecture [article]

Wenguang Wang, Wenguang Yu, Qun Li, Weiping Wang, Xichun Liu (College of Information System and Management, National University of Defense Technology, Changsha, China)
2009 arXiv   pre-print
Then several key enhancements and changes of HLA Evolved Web Service API are introduced in comparison with native APIs, such as Federation Development and Execution Process, communication mechanisms, data  ...  encoding, session handling, testing environment and performance analysis.  ...  Gustavsson, Andreas Tolk, YANG Ruiping, CAO Xingping, HU Yanli and LEI Yonglin for the valuable discussions and constructive suggestions.  ... 
arXiv:0907.3983v2 fatcat:pyp23ezctbd2dd6fyzzm3rufbi

Multilayer Perceptron Guided Key Generation through Mutation with Recursive Replacement in Wireless Communication (MLPKG)

Arindam Sarkar
2012 International Journal on AdHoc Networking Systems  
Receiver will use identical multilayer perceptron generated session key for performing deciphering process for getting the recursive replacement encrypted cipher text and then mutated character code table  ...  For each session, different hidden layer of multilayer neural network is selected randomly and weights or hidden units of this selected hidden layer help to form a secret session key.  ...  synchronization process, weight vectors between input layer and activated hidden layer of both multilayer perceptron systems become identical.  ... 
doi:10.5121/ijans.2012.2302 fatcat:nkd3kgamfncvli7mxcbhhoathi

Technical Challenges of a Mobile Application Supporting Intersession Processes in Psychotherapy

Michael Stach, Carsten Vogel, Thorsten-Christian Gablonski, Sylke Andreas, Thomas Probst, Manfred Reichert, Marc Schickler, Rüdiger Pryss
2020 Procedia Computer Science  
The latter requires a bidirectional data flow in order to enable the possibility of sending feedback to the patients and controlling their experiences through interventions.  ...  Collecting data using the mentioned approach is often called Ecological Momentary Assessment (EMA) and is characterized by an unidirectional data flow towards the platform provider.  ...  Regarding the first aspect, intersession processes [26, 5] characterize the processes happening in the period of time between two sessions of a patient with his/her therapist.  ... 
doi:10.1016/j.procs.2020.07.038 fatcat:e45arng6gfctnpyhmc3gsdcu5a

Group Session Key Exchange Multilayer Perceptron Based Simulated Annealing Guided Automata and Comparison Based Metamorphosed Encryption in Wireless Communication (GSMLPSA)

Arindam Sarkar, J. K. Mandal
2013 International Journal of Wireless & Mobile Networks  
Since in this case each communicating party has to synchronize with other for swapping over the key.  ...  Two parties can swap over a common key using synchronization between their own multilayer perceptrons. But the problem crop up when group of N parties desire to swap over a key.  ...  Hidden Layer as a Secret Session Key At end of full weight synchronization process, weight vectors between input layer and activated hidden layer of both multilayer perceptron systems become identical.  ... 
doi:10.5121/ijwmn.2013.5415 fatcat:raire6umzzc3zoub67pj7r35ji

An architecture for developing distributed collaborative applications using HTML5

Nelson Baloian, Francisco Gutierrez, Gustavo Zurita
2013 Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD)  
One of the main issues when developing distributed collaborative systems is to support synchronization processes.  ...  The Coupled Objects paradigm has emerged as a way to easily support these processes by dynamically coupling arbitrary user interface objects between heterogeneous applications.  ...  Therefore, in order to trigger the synchronization between coupled objects, the intended application should follow these simple steps: • Initializing communication with server; • Joining a session; and  ... 
doi:10.1109/cscwd.2013.6580965 dblp:conf/cscwd/BaloianGZ13 fatcat:qedmewsjazghhb2gmvloevke5i

Study on Deployment of Web Services for User Interaction in Multimedia Networks

Ivaylo Atanasov
2013 Cybernetics and Information Technologies  
Models of user interaction session are proposed. It is proved that both models expose equivalent behaviour. A use-case example is provided.  ...  The message is played and the result is reported to the Parlay X gateway and to the application.  ...  The call is established in the network and the Parlay X gateway is notified. Then using the OSA UI interfaces the Parlay X requests from OSA gateway to create a copy of UI object.  ... 
doi:10.2478/cait-2013-0015 fatcat:w5hn3iper5etzh3757nxroodyq

The Role of Video Support in Physical Class Management: A Review of Literature

2017 International Journal of Managerial Studies and Research  
Student motivation is the essence of the learning process.  ...  One way of increasing this motivation is the use of videos in class as an additional tool in order to enhance the quality of education and make it more efficient.  ...  There is a bidirectional information flow and interaction between student, instructor and content in teaching environments.  ... 
doi:10.20431/2349-0349.0512003 fatcat:6ysxru4b55bnldteuutivqebze
« Previous Showing results 1 — 15 out of 5,223 results