Sciweavers

4455 search results - page 802 / 891
» The family and communication technologies
Sort
View
PIMRC
2010
IEEE
14 years 10 months ago
Power control versus multiuser detection based cross-layer design in wireless ad hoc networks
Abstract--In wireless ad hoc networks, multiple access interference is the limiting factor for the overall system performance. The lack of any central control unit necessitates a c...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
162
Voted
ICISC
2009
184views Cryptology» more  ICISC 2009»
14 years 10 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
89
Voted
IEEESCC
2009
IEEE
14 years 10 months ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...
124
Voted
ALGOSENSORS
2010
Springer
14 years 11 months ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
172
Voted
MANSCI
2011
14 years 7 months ago
Organizational Change and Employee Stress
This article analyzes the relationship between organizational change and employee health. It illuminates the potentially negative outcomes of change at the level of the employee. ...
Michael S. Dahl