Sciweavers

14558 search results - page 2839 / 2912
» Resources
Sort
View
TWC
2008
120views more  TWC 2008»
15 years 1 months ago
A cartel maintenance framework to enforce cooperation in wireless networks with selfish users
Abstract-- In distributed wireless networks without centralized control, each user is its own authority to maximize its own performance. This distributed characteristic provides th...
Zhu Han, Zhu Ji, K. J. Ray Liu
TWC
2008
154views more  TWC 2008»
15 years 1 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
UMUAI
2008
144views more  UMUAI 2008»
15 years 1 months ago
Tag-based user modeling for social multi-device adaptive guides
This paper aims to demonstrate that the principles of adaptation and user modeling, especially social annotation, can be integrated fruitfully with those of the Web 2.0 paradigm a...
Francesca Carmagnola, Federica Cena, Luca Console,...
VLSISP
2008
203views more  VLSISP 2008»
15 years 1 months ago
FPGA-based System for Real-Time Video Texture Analysis
This paper describes a novel system for real-time video texture analysis. The system utilizes hardware to extract 2nd -order statistical features from video frames. These features ...
Dimitrios E. Maroulis, Dimitrios K. Iakovidis, Dim...
WICOMM
2008
139views more  WICOMM 2008»
15 years 1 months ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
« Prev « First page 2839 / 2912 Last » Next »