Sciweavers

2413 search results - page 305 / 483
» Understanding the problem
Sort
View
102
Voted
PERVASIVE
2009
Springer
15 years 10 months ago
Askus: Amplifying Mobile Actions
Information sharing has undeniably become ubiquitous in the Internet age. The global village created on the Internet provides people with instant access to information and news on ...
Shin'ichi Konomi, Niwat Thepvilojanapong, Ryohei S...
ICASSP
2009
IEEE
15 years 10 months ago
Voice convergin: Speaker de-identification by voice transformation
Speaker identification might be a suitable answer to prevent unauthorized access to personal data. However we also need to provide solutions to secure transmission of spoken infor...
Qin Jin, Arthur R. Toth, Tanja Schultz, Alan W. Bl...
149
Voted
ICC
2009
IEEE
190views Communications» more  ICC 2009»
15 years 10 months ago
Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks
Abstract—Network flow models serve as a popular mathematical framework for the analysis and optimization of Multi-hop Wireless Networks. They also serve to provide the understan...
Vinay Kolar, Nael B. Abu-Ghazaleh, Petri Mäh&...
ICNP
2009
IEEE
15 years 10 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
137
Voted
IEEECIT
2009
IEEE
15 years 10 months ago
Clustering of Software Systems Using New Hybrid Algorithms
—Software clustering is a method for increasing software system understanding and maintenance. Software designers, first use MDG graph to model the structure of software system. ...
Ali Safari Mamaghani, Mohammad Reza Meybodi