Sciweavers

2841 search results - page 558 / 569
» A Call to Order
Sort
View
ICIP
2010
IEEE
14 years 7 months ago
A hybrid fusion method of fingerprint identification for high security applications
Though fingerprint identification is widely used now, its imperfect performance for some high security applications, such as ATM, the access control of nuclear power stations and ...
Yilong Yin, Yanbin Ning, Zhiguo Yang
INFOCOM
2010
IEEE
14 years 7 months ago
Reliable Wireless Broadcasting with Near-Zero Feedback
We examine the problem of minimizing feedbacks in reliable wireless broadcasting, by pairing rateless coding with extreme value theory. Our key observation is that, in a broadcast ...
Weiyao Xiao, Sachin Agarwal, David Starobinski, Ar...
OPODIS
2010
14 years 7 months ago
Biased Selection for Building Small-World Networks
Abstract. Small-world networks are currently present in many distributed applications and can be built augmenting a base network with long-range links using a probability distribut...
Andrés Sevilla, Alberto Mozo, M. Araceli Lo...
SECON
2010
IEEE
14 years 7 months ago
Managing TCP Connections in Dynamic Spectrum Access Based Wireless LANs
Wireless LANs have been widely deployed as edge access networks in home/office/commercial buildings, providing connection to the Internet. Therefore, performance of end-toend conne...
Ahwini Kumar, Kang G. Shin
TRIDENTCOM
2010
IEEE
14 years 7 months ago
Polymorphic Ubiquitous Network Testbed RUBIQ
In this paper we present RUBIQ, a polymorphic ubiquitous network testbed. RUBIQ works on StarBED, which is a network testbed consisting of hundreds of PCs connected to each other. ...
Junya Nakata, Razvan Beuran, Takashi Okada, Ken-ic...