Sciweavers

8377 search results - page 1647 / 1676
» Scenarios - Introduction
Sort
View
ICISC
2009
184views Cryptology» more  ICISC 2009»
14 years 9 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
ICMCS
2009
IEEE
179views Multimedia» more  ICMCS 2009»
14 years 9 months ago
Providing QoS support for wireless remote healthcare system
Abstract--Recent advances in wireless sensor technology facilitate the development of remote healthcare systems, which can significantly reduce the healthcare cost. Despite the ini...
Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena B...
ICMLA
2009
14 years 9 months ago
Learning Geographic Regions using Location Based Services in Next Generation Networks
Abstract--In this paper we apply classification to learn geographic regions using Location Based Services (LBS) in Next Generation Networks (NGN). We assume that the information in...
Yuheng He, Attila Bilgic
ICPP
2009
IEEE
14 years 9 months ago
Heterogeneity-Aware Erasure Codes for Peer-to-Peer Storage Systems
Peer-to-peer (P2P) storage systems rely on data redundancy to obtain high levels of data availability. Among the existing data redundancy schemes, erasure coding is a widely adopte...
Lluis Pamies-Juarez, Pedro García Ló...
ICPPW
2009
IEEE
14 years 9 months ago
Improvement of Messages Delivery Time on Vehicular Delay-Tolerant Networks
Vehicular Delay-Tolerant Networks (VDTNs) are an application of the Delay-Tolerant Network (DTN) concept, where the movement of vehicles and their message relaying service is used ...
Vasco Nuno da Gama de Jesus Soares, Joel Jos&eacut...
« Prev « First page 1647 / 1676 Last » Next »