Sciweavers

15782 search results - page 2944 / 3157
» Network Optimization and Control
Sort
View
NDSS
2008
IEEE
15 years 10 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
SAINT
2008
IEEE
15 years 10 months ago
Distributed Sensor Information Management Architecture Based on Semantic Analysis of Sensing Data
In the ubiquitous computing environment, we believe that P2P-based context-aware application utilizing sensing data is important. However, since sensors are not placed under the c...
Tomoya Kawakami, Bich Lam Ngoc Ly, Susumu Takeuchi...
138
Voted
ICC
2007
IEEE
127views Communications» more  ICC 2007»
15 years 10 months ago
Adaptive-Buffer Power Save Mechanism for Mobile Multimedia Streaming
— Wireless networks are becoming a part of everyday life for many people. When a mobile device has wireless LAN capability, multimedia content can be streamed over a wireless net...
Janet Adams
140
Voted
ICNSC
2007
IEEE
15 years 10 months ago
Towards Robot-Assisted Mass-Casualty Triage
Abstract— This paper provides a discussion on how teleoperated robots could be utilized to do the simple triage of victims of a multiple casualty incident. Previous work in the a...
Carolina Chang, Robin R. Murphy
142
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Millimeter Wave WPAN: Cross-Layer Modeling and Multi-Hop Architecture
— The 7 GHz of unlicensed spectrum in the 60 GHz band offers the potential for multiGigabit indoor wireless personal area networking (WPAN). With recent advances in the speed of ...
Sumit Singh, Federico Ziliotto, Upamanyu Madhow, E...
« Prev « First page 2944 / 3157 Last » Next »