Sciweavers

2545 search results - page 334 / 509
» ARQ for Network Coding
Sort
View
114
Voted
NDSS
2009
IEEE
15 years 10 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...
119
Voted
IPPS
2009
IEEE
15 years 10 months ago
Validating Wrekavoc: A tool for heterogeneity emulation
Experimental validation and testing of solutions designed for heterogeneous environment is a challenging issue. Wrekavoc is a tool for performing such validation. It runs unmodi...
Olivier Dubuisson, Jens Gustedt, Emmanuel Jeannot
IWCMC
2009
ACM
15 years 10 months ago
A cognitive radio system for home theatre "5+1 audio" surround applications
This paper presents the application of cognitive algorithm for a stream diffusion in home theatre “5+1 audio” surround applications. We develop a wavelet-based method to effic...
Valeria Orani, Vlad Popescu, Maurizio Murroni
117
Voted
AINA
2008
IEEE
15 years 10 months ago
WS-BPEL Process Compiler for Resource-Constrained Embedded Systems
Process management and workflow systems play an important role in the composition of services in business as well as automation environments. Processes are designed using tools a...
Hendrik Bohn, Andreas Bobek, Frank Golatowski
FGCN
2008
IEEE
153views Communications» more  FGCN 2008»
15 years 10 months ago
Experimental Study on Neuronal Spike Sorting Methods
When recording extracellular neural activity, it is often necessary to distinguish action potentials arising from distinct cells near the electrode tip, a process commonly referre...
Jianhua Dai, Xiaochun Liu, Yu Yi, Huaijian Zhang, ...