Sciweavers

1030 search results - page 204 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
ECCV
2004
Springer
15 years 3 months ago
Biometric Sensor Interoperability: A Case Study in Fingerprints
The problem of biometric sensor interoperability has received limited attention in the literature. Most biometric systems operate under the assumption that the data (viz., images) ...
Arun Ross, Anil K. Jain
CHI
2011
ACM
14 years 1 months ago
Enhancing independence and safety for blind and deaf-blind public transit riders
Blind and deaf-blind people often rely on public transit for everyday mobility, but using transit can be challenging for them. We conducted semi-structured interviews with 13 blin...
Shiri Azenkot, Sanjana Prasain, Alan Borning, Emil...
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
15 years 3 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
MOBICOM
2006
ACM
15 years 3 months ago
Long-distance 802.11b links: performance measurements and experience
The use of 802.11 long-distance links is a cost-effective means of providing wireless connectivity to rural areas. Although deployments in this setting are increasing, a systemat...
Kameswari Chebrolu, Bhaskaran Raman, Sayandeep Sen
MSWIM
2005
ACM
15 years 3 months ago
Latency-sensitive power control for wireless ad-hoc networks
We investigate the impact of power control on latency in wireless ad-hoc networks. If transmission power is increased, interference increases, thus reducing network capacity. A no...
Mohamed R. Fouad, Sonia Fahmy, Gopal Pandurangan