Sciweavers

5068 search results - page 916 / 1014
» Basic Computations in Wireless Networks
Sort
View
FTDCS
2003
IEEE
15 years 3 months ago
Adopting Redundancy Techniques for Multicast Stream Authentication
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Fe...
VISUALIZATION
2003
IEEE
15 years 3 months ago
Planet-Sized Batched Dynamic Adaptive Meshes (P-BDAM)
We describe an efficient technique for out-of-core management and interactive rendering of planet sized textured terrain surfaces. The technique, called P-Batched Dynamic Adaptiv...
Paolo Cignoni, Fabio Ganovelli, Enrico Gobbetti, F...
CSREASAM
2006
14 years 11 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
CISSE
2008
Springer
14 years 11 months ago
Secondary Emotions Deduction from Context
— Human centred services are increasingly common in the market of mobile devices. However, affective aware services are still scarce. In turn, the recognition of secondary emotio...
Kuderna-Iulian Benta, Marcel Cremene, Nicoleta Ram...
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
15 years 3 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...