Sciweavers

4098 search results - page 678 / 820
» Sound mobility models
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 4 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
MSWIM
2009
ACM
15 years 11 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...

Lecture Notes
773views
17 years 2 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
ICIP
2001
IEEE
16 years 6 months ago
Region-based active contours for video object segmentation with camera compensation
In this paper, we present a new algorithm for the segmentation of moving objects in a video sequence acquired by a mobile camera using region-based active contours. Indeed, active...
Gilles Aubert, Michel Barlaud, Stéphanie Je...
ICDE
2000
IEEE
144views Database» more  ICDE 2000»
16 years 5 months ago
Power Conservative Multi-Attribute Queries on Data Broadcast
In this paper, we study power conservation techniques for multi-attribute queries on wireless data broadcast channels. Indexing data on broadcast channels can improve client filte...
Qinglong Hu, Wang-Chien Lee, Dik Lun Lee