Sciweavers

2179 search results - page 405 / 436
» Symmetry within Solutions
Sort
View
132
Voted
CCS
2008
ACM
15 years 2 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
118
Voted
CEAS
2008
Springer
15 years 2 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
133
Voted
DIALM
2005
ACM
130views Algorithms» more  DIALM 2005»
15 years 2 months ago
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks
Wireless LANs operating within unlicensed frequency bands require random access schemes such as CSMA/CA, so that wireless networks from different administrative domains (for exam...
Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
ACMICEC
2008
ACM
240views ECommerce» more  ACMICEC 2008»
15 years 2 months ago
Document-oriented heterogeneous business process integration through collaborative e-marketplace
In this paper, we studied the semantic consistency maintenance issue between heterogeneous contexts, that is, how a firm business process of one e-marketplace can be transformed t...
Jingzhi Guo, Zhuo Hu, Chi-Kit Chan, Yufeng Luo, Ch...
CVPR
2008
IEEE
15 years 2 months ago
Real-time global localization with a pre-built visual landmark database
In this paper, we study how to build a vision-based system for global localization with accuracies within 10cm. for robots and humans operating both indoors and outdoors over wide...
Zhiwei Zhu, Taragay Oskiper, Supun Samarasekera, R...