Sciweavers

3955 search results - page 447 / 791
» Comparing the Power of Robots
Sort
View
SECON
2008
IEEE
15 years 10 months ago
Gateway Design for Data Gathering Sensor Networks
—Innovation in gateways for data gathering sensor networks has lagged compared to advances in mote-class devices, leaving us with a limited set of options for deploying such syst...
Raluca Musaloiu-Elefteri, Razvan Musaloiu-Elefteri...
ICC
2007
IEEE
157views Communications» more  ICC 2007»
15 years 10 months ago
Uplink Adaptive Resource Allocation Mitigating Inter-Cell Interference Fluctuation for Future Cellular Systems
—This paper aims to address the problem of inter-cell interference fluctuation, which is inherent on the uplink direction of future cellular systems employing OFDMA or single car...
Minghai Feng, Lan Chen, Xiaoming She
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 10 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
DBPL
2007
Springer
91views Database» more  DBPL 2007»
15 years 10 months ago
Relational Completeness of Query Languages for Annotated Databases
Annotated relational databases can be queried either by simply making the annotations explicitly available along the ordinary data, or by adapting the standard query operators so ...
Floris Geerts, Jan Van den Bussche
FC
2007
Springer
136views Cryptology» more  FC 2007»
15 years 10 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan