Sciweavers

828 search results - page 70 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
ICBA
2004
Springer
197views Biometrics» more  ICBA 2004»
15 years 8 months ago
Maximum Likelihood and Maximum a Posteriori Adaptation for Distributed Speaker Recognition Systems
We apply the ETSI’s DSR standard to speaker verification over telephone networks and investigate the effect of extracting spectral features from different stages of the ETSI...
Chin-Hung Sit, Man-Wai Mak, Sun-Yuan Kung
MOBISYS
2006
ACM
16 years 2 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
DCOSS
2008
Springer
15 years 4 months ago
Techniques for Improving Opportunistic Sensor Networking Performance
Abstract. A number of recently proposed mobile sensor network architectures rely on uncontrolled, or weakly-controlled mobility to achieve sensing coverage over time at low cost, a...
Shane B. Eisenman, Nicholas D. Lane, Andrew T. Cam...
SUTC
2006
IEEE
15 years 9 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
IPPS
2006
IEEE
15 years 9 months ago
A simulation study of the effects of multi-path approaches in e-commerce applications
Response time is a key factor of any e-Commerce application, and a set of solutions have been proposed to provide low response time despite network congestions or failures. Being ...
Paolo Romano, Francesco Quaglia, Bruno Ciciani