Sciweavers

2421 search results - page 199 / 485
» Message from the Editor-in-Chief
Sort
View
HT
2010
ACM
15 years 7 months ago
Conversational tagging in twitter
Users on Twitter, a microblogging service, started the phenomenon of adding tags to their messages sometime around February 2008. These tags are distinct from those in other Web 2...
Jeff Huang, Katherine M. Thornton, Efthimis N. Eft...
ISPAN
2002
IEEE
15 years 6 months ago
A Self-Routing Topology for Bluetooth Scatternets
—The emerging Bluetooth standard is considered to be the most promising technology to construct ad-hoc networks. It contains specifications on how to build a piconet but left ou...
Min-Te Sun, Chung-Kuo Chang, Ten-Hwang Lai
CSE
2009
IEEE
15 years 6 months ago
MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing Protocol
—Wireless sensor networks consist of a number of small wireless sensor nodes which take measurements and transmit them over wireless links. As wireless sensors are resource const...
Kunjan Patel, Lim Jong Chern, Chris J. Bleakley, W...
ICOIN
2001
Springer
15 years 6 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
POPL
1999
ACM
15 years 6 months ago
Software Watermarking: Models and Dynamic Embeddings
Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image. Watermarking an object dis...
Christian S. Collberg, Clark D. Thomborson