Sciweavers

2608 search results - page 369 / 522
» Issue Management
Sort
View
114
Voted
WCNC
2008
IEEE
15 years 9 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel
ACSC
2007
IEEE
15 years 9 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague
EDOC
2007
IEEE
15 years 9 months ago
Survey of Traceability Approaches in Model-Driven Engineering
Models have been used in various engineering fields to help managing complexity and represent information in difbstraction levels, according to specific notations and stakeholde...
Ismênia Galvão, Arda Goknil
123
Voted
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 9 months ago
Predicting the Performance of Mobile Ad Hoc Networks Using Scaled-Down Replicas
—Experimentation with mobile ad hoc network testbeds is preferred to simulations for performing high fidelity testing. But, at the same time, realistic experimentation with larg...
Fragkiskos Papadopoulos, Konstantinos Psounis
ICDE
2007
IEEE
209views Database» more  ICDE 2007»
15 years 9 months ago
Hierarchical Temporal Association Mining for Video Event Detection in Video Databases
With the proliferation of multimedia data and evergrowing requests for multimedia applications, new challenges are emerged for efficient and effective managing and accessing large...
Min Chen, Shu-Ching Chen, Mei-Ling Shyu