Sciweavers

2007 search results - page 263 / 402
» SPECTRUM
Sort
View
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 11 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...
134
Voted
WIMOB
2008
IEEE
15 years 11 months ago
Using LED Lighting for Ubiquitous Indoor Wireless Networking
—Wireless networking is currently dominated by radio frequency (RF) techniques. However, the soon-to-be ubiquity of LED-based lighting motivated by significant energy savings pro...
Thomas D. C. Little, Peter Dib, Kandarp Shah, Nick...
141
Voted
WMCSA
2008
IEEE
15 years 11 months ago
Distributed authentication for low-cost wireless networks
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the c...
Sridhar Machiraju, Hao Chen, Jean Bolot
CCGRID
2007
IEEE
15 years 11 months ago
Analysis and Synthesis of Pseudo-Periodic Job Arrivals in Grids: A Matching Pursuit Approach
Pseudo-periodicity is one of the basic job arrival patterns on data-intensive clusters and Grids. In this paper, a signal decomposition methodology called matching pursuit is appl...
Hui Li, Richard Heusdens, Michael Muskulus, Lex Wo...
170
Voted
ENC
2007
IEEE
15 years 11 months ago
fMRI Brain Image Retrieval Based on ICA Components
This manuscript proposes a retrieval system for fMRI brain images. Our goal is to find a similaritymetric to enable us to support queries for “similar tasks” for retrieval on...
Bing Bai, Paul B. Kantor, Ali Shokoufandeh, Debora...