Sciweavers

3910 search results - page 661 / 782
» Analyzing Cross-Connected Networks
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
16 years 6 days ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ICDCSW
2009
IEEE
16 years 4 days ago
A MANET Based Emergency Communication and Information System for Catastrophic Natural Disasters
When stricken by a catastrophic natural disaster, emergency rescue operation is very critical to many lives. Many people trapped in the disastrous areas under collapsed buildings ...
Yao-Nan Lien, Hung-Chin Jang, Tzu-Chieh Tsai
ICPPW
2009
IEEE
16 years 4 days ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta
ICRA
2009
IEEE
127views Robotics» more  ICRA 2009»
16 years 4 days ago
Relative bearing estimation from commodity radios
— Relative bearing between robots is important in applications like pursuit-evasion [11] and SLAM [7]. This is also true in in sensor networks, where the bearing of one sensor no...
Karthik Dantu, Prakhar Goyal, Gaurav S. Sukhatme
INFOCOM
2009
IEEE
16 years 3 days ago
On Mechanism Design without Payments for Throughput Maximization
—It is well-known that the overall efficiency of a distributed system can suffer if the participating entities seek to maximize their individual performance. Consequently, mecha...
Thomas Moscibroda, Stefan Schmid