Sciweavers

206 search results - page 22 / 42
» Technology in the hearts of the faculty
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment
? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
80
Voted
CIMCA
2008
IEEE
15 years 4 months ago
Novel Cardiac Risk Factor Stratification Using Neuro-fuzzy Tool
Heart disease continues to be leading cause of morbidity and mortality among adults all over the world. Cardiac risk factor assessment requires a classification system that is rob...
Elahe Yargholi, Saman Parvaneh
AP2PC
2003
Springer
15 years 2 months ago
A P2P Approach to ClassLoading in Java
The Classloader has long been one of the key extensibility points of the Java Virtual Machine architecture. It lies at the heart of many of the distributed mechanisms that have mad...
Daryl Parker, David Cleary
IH
2001
Springer
15 years 2 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
IH
1999
Springer
15 years 1 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel