Sciweavers

988 search results - page 105 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
IPCCC
2006
IEEE
15 years 3 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
ISCC
2006
IEEE
15 years 3 months ago
Evaluating Filtering Strategies for Decentralized Handover Prediction in the Wireless Internet
The rapid diffusion of heterogeneous forms of wireless connectivity is pushing the tremendous growth of the commercial interest in mobile services, i.e., distributed applications ...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
DSN
2005
IEEE
15 years 3 months ago
Perturbation-Resistant and Overlay-Independent Resource Discovery
This paper realizes techniques supporting the position that strategies for resource location and discovery in distributed systems should be both perturbation-resistant and overlay...
Steven Y. Ko, Indranil Gupta
ACMSE
2005
ACM
15 years 3 months ago
Facilitating and automating empirical evaluation
Through the automation of empirical evaluation we hope to alleviate evaluation problems encountered by software designers who are relatively new to the process. Barriers to good e...
Laurian Hobby, John Booker, D. Scott McCrickard, C...
CCIA
2005
Springer
15 years 3 months ago
Angle Images using Gabor Filters in Cardiac Tagged MRI
Tagged Magnetic Resonance Imaging (MRI) is a non-invasive technique used to examine cardiac deformation in vivo. An Angle Image is a representation of a Tagged MRI which recovers t...
Joel Barajas, Jaume Garcia-Barnes, Francesc Carrer...