Sciweavers

3483 search results - page 692 / 697
» Forward
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
ICDE
2011
IEEE
244views Database» more  ICDE 2011»
14 years 1 months ago
Algorithms for local sensor synchronization
— In a wireless sensor network (WSN), each sensor monitors environmental parameters, and reports its readings to a base station, possibly through other nodes. A sensor works in c...
Lixing Wang, Yin Yang, Xin Miao, Dimitris Papadias...
BMCBI
2011
14 years 1 months ago
CLOTU: An online pipeline for processing and clustering of 454 amplicon reads into OTUs followed by taxonomic annotation
Background: The implementation of high throughput sequencing for exploring biodiversity poses high demands on bioinformatics applications for automated data processing. Here we in...
Surendra Kumar, Tor Carlsen, Bjørn-Helge Me...
CHI
2011
ACM
14 years 1 months ago
PaperPhone: understanding the use of bend gestures in mobile devices with flexible electronic paper displays
Flexible displays potentially allow for interaction styles that resemble those used in paper documents. Bending the display, e.g., to page forward, shows particular promise as an ...
Byron Lahey, Audrey Girouard, Winslow Burleson, Ro...
INFOCOM
2011
IEEE
14 years 25 days ago
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
—We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). We use combinatorial designs to establish pairwise keys betwee...
Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic