Sciweavers

2978 search results - page 215 / 596
» Operations Research
Sort
View
ISPA
2005
Springer
15 years 9 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
127
Voted
AIM
2006
15 years 5 months ago
Experimenting with ICT-intensive public and private collaboration projects: The canadian experience
This research examines nine ICT-intensive and innovative projects involving both public and private sectors in the delivery of public services and attempts to identify their main c...
Lise Préfontaine, L. Ricard, Hél&egr...
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
15 years 10 months ago
Modeling Network Decisions under Uncertainty: Countervailing Externalities and Embedded Options
The analysis of externalities in technology-based networks continues to be of significant managerial importance in e-commerce and traditional IS operations. Competitive strategy, ...
Robert J. Kauffman, Ajay Kumar
ICASSP
2011
IEEE
14 years 7 months ago
Anti-forensics for frame deletion/addition in MPEG video
Due to the ease with which digital information can be altered, many digital forensic techniques have recently been developed to authenticate multimedia content. One important digi...
Matthew C. Stamm, K. J. Ray Liu
107
Voted
IMC
2009
ACM
15 years 10 months ago
Understanding slow BGP routing table transfers
Researchers and network operators often say that BGP table transfers are slow. Despite this common knowledge, the reasons for slow BGP transfers are not well understood. This pape...
Zied Ben-Houidi, Mickael Meulle, Renata Teixeira