Sciweavers

476 search results - page 55 / 96
» On the Superdistribution of Digital Goods
Sort
View
ICDCSW
2005
IEEE
15 years 3 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Lossless image compression with tree coding of magnitude levels
With the rapid development of digital technology in consumer electronics, the demand to preserve raw image data for further editing or repeated compression is increasing. Traditio...
Hua Cai, Jiang Li
ICNP
2005
IEEE
15 years 3 months ago
Routing in Ad-hoc Networks with MIMO Links
Smart antennas include a broad variety of antenna technologies ranging from the simple switched beams to the sophisticated digital adaptive arrays. While beam-forming antennas are...
Karthikeyan Sundaresan, Raghupathy Sivakumar
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
SIBGRAPI
2005
IEEE
15 years 3 months ago
A Maximum-Likelihood Approach for Multiresolution W-Operator Design
The design of W-operators from a set of input/output examples for large windows is a hard problem. From the statistical standpoint, it is hard because of the large number of examp...
Daniel André Vaquero, Junior Barrera, Rober...