Sciweavers

42 search results - page 7 / 9
» wowmom 2006
Sort
View
WOWMOM
2006
ACM
108views Multimedia» more  WOWMOM 2006»
13 years 11 months ago
Multimedia Correlation Analysis in Unstructured Peer-to-Peer Networks
Recent years saw the rapid development of peer-topeer (P2P) networks in a great variety of applications. However, similarity-based k-nearest-neighbor retrieval (k-NN) is still a c...
Bo Yang, Ali R. Hurson, Yu Jiao, Thomas E. Potok
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
13 years 11 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
13 years 11 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
WOWMOM
2006
ACM
111views Multimedia» more  WOWMOM 2006»
13 years 11 months ago
An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards
— It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance dif...
Antonio Di Stefano, Giovanni Terrazzino, Luca Scal...
WOWMOM
2006
ACM
92views Multimedia» more  WOWMOM 2006»
13 years 11 months ago
Inter-Regional Messenger Scheduling in Delay Tolerant Mobile Networks
The evolution of wireless devices along with the increase in user mobility have created new challenges such as network partitioning and intermittent connectivity. These new challe...
Khaled A. Harras, Kevin C. Almeroth