Sciweavers

1875 search results - page 341 / 375
» Modeling the Security of Steganographic Systems
Sort
View
MOBIWAC
2009
ACM
15 years 6 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
EMSOFT
2005
Springer
15 years 5 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
78
Voted
ICSE
2007
IEEE-ACM
15 years 12 months ago
A Perspective on the Future of Middleware-based Software Engineering
Middleware is a software layer that stands between the networked operating system and the application and provides well known reusable solutions to frequently encountered problems...
Mauro Caporuscio, Nikolaos Georgantas, Valé...
76
Voted
ICASSP
2009
IEEE
15 years 6 months ago
Time-sensitive behavior dynamics in multimedia fingerprinting social networks
Multimedia social network is a network infrastructure in which the social network members share multimedia contents with all different purposes. Analyzing user behavior in multime...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
89
Voted
ICRA
2008
IEEE
145views Robotics» more  ICRA 2008»
15 years 6 months ago
Who am I talking with? A face memory for social robots
— In order to provide personalized services and to develop human-like interaction capabilities robots need to recognize their human partner. Face recognition has been studied in ...
Marc Hanheide, Sebastian Wrede, Christian Lang, Ge...