Sciweavers

7195 search results - page 1305 / 1439
» On Computing Power
Sort
View
147
Voted
LCN
2008
IEEE
15 years 10 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
P2P
2008
IEEE
137views Communications» more  P2P 2008»
15 years 10 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
WACV
2008
IEEE
15 years 10 months ago
Distributed Visual Processing for a Home Visual Sensor Network
deliver objects, handle emergency, wherever he/she is inside the home. In addition, the burden of processing We address issues dealing with distributed visual power can be distribu...
Kwangsu Kim, Gérard G. Medioni
ACSC
2007
IEEE
15 years 10 months ago
Periodical Payment Model Using Restricted Proxy Certificates
In this paper we shall introduce a new electronic payment concept based on the popular direct debit payment model, entitled periodical payments. The direct debit model currently i...
Grigori Goldman
128
Voted
AINA
2007
IEEE
15 years 10 months ago
Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks
—Wireless and mobile networks have experienced great success over the past few years. However, any single type of wireless and mobile network cannot provide all types of services...
Wei Shen, Qing-An Zeng
« Prev « First page 1305 / 1439 Last » Next »