Sciweavers

620 search results - page 83 / 124
» The computational power of population protocols
Sort
View
JCP
2007
88views more  JCP 2007»
14 years 9 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
PERCOM
2007
ACM
15 years 9 months ago
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment
? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
PERCOM
2005
ACM
15 years 9 months ago
Cooperative Packet Forwarding in Multi-Domain Sensor Networks
Sensor networks are large scale networks of low-power devices that collaborate in order to perform a given task. The sensors are limited in battery energy, capacity and computatio...
Márk Félegyházi, Jean-Pierre ...
AIMS
2010
Springer
14 years 10 months ago
Adaptive Underwater Acoustic Communications
Underwater wireless networks consist of mobile and static nodes, which usually communicate using the acoustic channel since radio transmissions attenuate rapidly and optical commun...
Anuj Sehgal, Jürgen Schönwälder
AINA
2010
IEEE
15 years 2 months ago
Encoding and Compression for the Devices Profile for Web Services
—Most solutions for Wireless Sensor Networks (WSN) come equipped with their own architectural concepts which raise the problem of possible incompatibility of computer networks an...
Guido Moritz, Dirk Timmermann, Regina Stoll, Frank...