Sciweavers

618 search results - page 87 / 124
» Short cycle connectivity
Sort
View
ICNS
2009
IEEE
15 years 4 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
FSKD
2009
Springer
145views Fuzzy Logic» more  FSKD 2009»
15 years 4 months ago
Chinese Web Comments Clustering Analysis with a Two-phase Method
Usually a meaningful web topic has tens of thousands of comments, especially the hot topics. It is valuable if we congregate the comments into clusters and find out the mainstrea...
Yexin Wang, Li Zhao, Yan Zhang
MDM
2009
Springer
125views Communications» more  MDM 2009»
15 years 4 months ago
Data Gathering by Mobile Mules in a Spatially Separated Wireless Sensor Network
While wireless sensor networks (WSNs) are typically targeted at large-scale deployment, due to many practical or inevitable reasons, a WSN may not always remain connected. In this...
Fang-Jing Wu, Chi-Fu Huang, Yu-Chee Tseng
ICPR
2008
IEEE
15 years 4 months ago
Automatic face and facial features initialization for robust and accurate tracking
Face detection and tracking, through image sequences, are primary steps in many applications such as video surveillance, human computer interface, and expression analysis. Many cu...
Murad Al Haj, Javier Orozco, Jordi Gonzàlez...
MUE
2008
IEEE
84views Multimedia» more  MUE 2008»
15 years 4 months ago
TCP-Based Dynamic Media Stream Adaptation in Ubiquitous Environment
More and more media material is consumed in ubiquitous environment where the service can be experienced over different devices, network conditions, network bearers, etc. Unlike in...
Gergely Hományi, Gábor Paller