Sciweavers

1860 search results - page 136 / 372
» An Internet Based Development Framework for Reconfigurable C...
Sort
View
NETWORK
2007
148views more  NETWORK 2007»
15 years 2 months ago
Integration of IEEE 802.11 WLANs with IEEE 802.16-based multihop infrastructure mesh/relay networks: A game-theoretic approach t
One of the promising applications of IEEE 802.16 (WiMAX)-based wireless mesh/relay networks is to provide infrastructure/backhaul support for IEEE 802.11based mobile hotspots. In ...
Dusit Niyato, Ekram Hossain
129
Voted
ISADS
1999
IEEE
15 years 7 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ICPR
2006
IEEE
16 years 4 months ago
Fast, Illumination Insensitive Face Detection Based on Multilinear Techniques and Curvature Features
This paper brings together two recent developments in image analysis. We consider a new mathematical framework that provides illumination invariant descriptors for face detection....
Christian Bauckhage, Thomas Käster
124
Voted
NCA
2009
IEEE
15 years 10 months ago
Attribute-Based Prevention of Phishing Attacks
Abstract—This paper describes a set of innovative attributebased checks for defending against phishing attacks1 . We explain a number of anti-phishing algorithms implemented as p...
Michael Atighetchi, Partha Pratim Pal
EUROPAR
2001
Springer
15 years 7 months ago
From Cluster Monitoring to Grid Monitoring Based on GRM
GRM was originally designed and implemented as part of the P-GRADE graphical parallel program development environment running on supercomputers and clusters. In the framework of th...
Zoltán Balaton, Péter Kacsuk, Norber...