Sciweavers

42738 search results - page 8279 / 8548
» Search Computing Systems
Sort
View
128
Voted
IWCMC
2006
ACM
15 years 9 months ago
Load balancing in the call admission control of heterogeneous wireless networks
In the next generation wireless systems (NGWS) the end user will be able to connect to any of the different available access networks. The end user will also be able to roam seaml...
Kamil H. Suleiman, H. Anthony Chan, Mqhele E. Dlod...
148
Voted
IWCMC
2006
ACM
15 years 9 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
132
Voted
JCDL
2006
ACM
159views Education» more  JCDL 2006»
15 years 9 months ago
EcoPod: a mobile tool for community based biodiversity collection building
Biological studies rely heavily on large collections of species observations. All of these collections cannot be compiled by biology professionals alone. Skilled amateurs can assi...
YuanYuan Yu, Jeannie A. Stamberger, Aswath Manohar...
183
Voted
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 9 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
161
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
« Prev « First page 8279 / 8548 Last » Next »