Sciweavers

2263 search results - page 361 / 453
» Principles of Template Design
Sort
View
166
Voted
VTC
2007
IEEE
192views Communications» more  VTC 2007»
15 years 10 months ago
Access Scheduling Based on Time Water-Filling for Next Generation Wireless LANs
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
Ertugrul Necdet Ciftcioglu, Özgür Gü...
127
Voted
CCS
2007
ACM
15 years 10 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
100
Voted
CCS
2007
ACM
15 years 10 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
120
Voted
CIVR
2007
Springer
15 years 10 months ago
Comparison of face matching techniques under pose variation
The ability to match faces in video is a crucial component for many multimedia applications such as searching and recognizing people in semantic video browsing, surveillance and h...
Bart Kroon, Alan Hanjalic, Sabri Boughorbel
136
Voted
DCOSS
2007
Springer
15 years 10 months ago
An Adaptive Scheduling Protocol for Multi-scale Sensor Network Architecture
In self-organizing networks of battery-powered wireless sensors that can sense, process, and communicate, energy is the most crucial and scarce resource. However, since sensor netw...
Santashil PalChaudhuri, David B. Johnson