Sciweavers

3999 search results - page 718 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
128
Voted
IPSN
2010
Springer
15 years 11 months ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...
139
Voted
DIM
2009
ACM
15 years 11 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
ISORC
2002
IEEE
15 years 9 months ago
Reactive Objects
Object-oriented, concurrent, and event-based programming models provide a natural framework in which to express the behavior of distributed and embedded software systems. However,...
Johan Nordlander, Mark P. Jones, Magnus Carlsson, ...
112
Voted
ICCV
2007
IEEE
15 years 11 months ago
A reliable skin mole localization scheme
Mole pattern changes are important cues in detecting melanoma at an early stage. As a first step to automatically register mole pattern changes from skin images, this paper prese...
Taeg Sang Cho, William T. Freeman, Hensin Tsao
HUC
2010
Springer
15 years 4 months ago
Examining micro-payments for participatory sensing data collections
The rapid adoption of mobile devices that are able to capture and transmit a wide variety of sensing modalities (media and location) has enabled a new data collection paradigm - p...
Sasank Reddy, Deborah Estrin, Mark H. Hansen, Mani...