Sciweavers

14850 search results - page 2948 / 2970
» The Security of
Sort
View
130
Voted
JUCS
2010
124views more  JUCS 2010»
15 years 7 days ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
MA
2010
Springer
149views Communications» more  MA 2010»
15 years 7 days ago
A nonparametric approach to 3D shape analysis from digital camera images - I
In this article, for the first time, one develops a nonparametric methodology for an analysis of shapes of configurations of landmarks on real 3D objects from regular camera pho...
V. Patrangenaru, X. Liu, S. Sugathadasa
160
Voted
MDM
2010
Springer
188views Communications» more  MDM 2010»
15 years 7 days ago
A Distributed Technique for Dynamic Operator Placement in Wireless Sensor Networks
—We present an optimal distributed algorithm to adapt the placement of a single operator in high communication cost networks, such as a wireless sensor network. Our parameterfree...
Georgios Chatzimilioudis, Nikos Mamoulis, Dimitrio...
126
Voted
P2P
2010
IEEE
132views Communications» more  P2P 2010»
15 years 6 days ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
PETRA
2010
ACM
15 years 6 days ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
« Prev « First page 2948 / 2970 Last » Next »