Sciweavers

819 search results - page 86 / 164
» BSN Simulator: Optimizing Application Using System Level Sim...
Sort
View
IPPS
2007
IEEE
15 years 11 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ATAL
2004
Springer
15 years 8 months ago
Distributed Path Planning for Robots in Dynamic Environments Using a Pervasive Embedded Network
We investigate the application of a low-cost, pervasively distributed network to plan paths for mobile robots in environments with dynamic obstacles. We consider a heterogeneous s...
Keith J. O'Hara, Tucker R. Balch
MICCAI
2006
Springer
16 years 6 months ago
A New CAD System for the Evaluation of Kidney Diseases Using DCE-MRI
Acute rejection is the most common reason of graft failure after kidney transplantation, and early detection is crucial to survive the transplanted kidney function. In this paper, ...
Ayman El-Baz, Rachid Fahmi, Seniha Esen Yuksel, Al...
ICDCSW
2005
IEEE
15 years 10 months ago
Control Theory Optimization of MECN in Satellite Networks
Congestion in the Internet results in wasted bandwidth and also stands in the way of guaranteeing QoS. The effect of congestion is multiplied many fold in Satellite networks, wher...
Arjan Durresi, Mukundan Sridharan, Sriram Chellapp...
IWMMDBMS
1998
123views more  IWMMDBMS 1998»
15 years 6 months ago
An Adaptive Block Management Scheme Using On-Line Detection of Block Reference Patterns
Recent research has shown that near optimal performance can be achieved by adaptive block replacement policies that use user-level hints regarding the block reference pattern. How...
Jongmoo Choi, Sam H. Noh, Sang Lyul Min, Yookun Ch...