Sciweavers

3130 search results - page 613 / 626
» Collusion without communication
Sort
View
TITB
2002
98views more  TITB 2002»
14 years 11 months ago
OILing the way to machine understandable bioinformatics resources
The complex questions and analyses posed by biologists, as well as the diverse data resources they develop, require the fusion of evidence from different, independently developed ...
Robert Stevens, Carole A. Goble, Ian Horrocks, Sea...
AES
2008
Springer
97views Cryptology» more  AES 2008»
14 years 11 months ago
Software mechanisms for extensible and scalable 3D visualization of construction operations
This paper presents research that led to the design and implementation of an extensible and scalable software framework for the dynamic 3D visualization of simulated construction ...
Vineet R. Kamat, Julio C. Martínez
COMCOM
2008
104views more  COMCOM 2008»
14 years 11 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 11 months ago
Interference Channel with an Out-of-Band Relay
A Gaussian interference channel (IC) with a relay is considered. The relay is assumed to operate over an orthogonal band with respect to the underlying IC, and the overall system i...
Onur Sahin, Osvaldo Simeone, Elza Erkip
NETWORK
2007
187views more  NETWORK 2007»
14 years 11 months ago
Cooperative and opportunistic transmission for wireless ad hoc networks
Moving toward 4G, wireless ad hoc networks receive growing interest due to users’ provisioning of mobility, usability of services, and seamless communications. In ad hoc network...
Qian Zhang, Qing Chen, Fan Yang, Xuemin Shen, Zhis...