Sciweavers

3370 search results - page 628 / 674
» Adding Networks
Sort
View
SECON
2007
IEEE
15 years 6 months ago
The Optimum Number of OSPF Areas for MANETs
—Mobile ad hoc networks (MANETs) are a critical technology in filling the gap where the network infrastructure is insufficient or does not exist at all. The dynamic topology of...
Jangeun Jun, Mihail L. Sichitiu, Hector D. Flores,...
ALGOSENSORS
2010
Springer
14 years 11 months ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
ICASSP
2010
IEEE
15 years 2 days ago
Automated ECG profiling and beat classification
ive CLP® ABSTRACT Ali A. Milani Broadband speech enhancement and active noise control nvironment ABSTRACT Vanishree Gopalakrishna Real-Time Implementation of Signal Processing Str...
Miad Faezipour, Adnan Saeed, Mehrdad Nourani
CORR
2007
Springer
163views Education» more  CORR 2007»
14 years 12 months ago
Personalizing Image Search Results on Flickr
The social media site Flickr allows users to upload their photos, annotate them with tags, submit them to groups, and also to form social networks by adding other users as contact...
Kristina Lerman, Anon Plangprasopchok, Chio Wong
EUROCRYPT
2007
Springer
15 years 6 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...