Sciweavers

9702 search results - page 1833 / 1941
» Communicating Mobile Processes
Sort
View
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 4 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
IJSN
2006
140views more  IJSN 2006»
15 years 4 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
JCP
2008
120views more  JCP 2008»
15 years 4 months ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong
JCST
2008
159views more  JCST 2008»
15 years 4 months ago
Coordinated Workload Scheduling in Hierarchical Sensor Networks for Data Fusion Applications
To minimize the execution time of a sensing task over a multi-hop hierarchical sensor network, we present a coordinated scheduling method following the divisible load scheduling p...
Xiao-Lin Li, Jiannong Cao
CORR
2007
Springer
75views Education» more  CORR 2007»
15 years 4 months ago
Wavelet Based Semi-blind Channel Estimation For Multiband OFDM
— This paper introduces an expectation-maximization (EM) algorithm within a wavelet domain Bayesian framework for semi-blind channel estimation of multiband OFDM based UWB commun...
Sajad Sadough, Mahieddine Ichir, Emmanuel Jaffrot,...
« Prev « First page 1833 / 1941 Last » Next »