Sciweavers

847 search results - page 127 / 170
» Video-on-Demand Networks: Design Approaches and Future Chall...
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
Making Radio Frequency Identification Visible - A Watchdog Tag
To address the privacy concerns associated with RFID, previous work proposed an approach, where RFID readers do not only broadcast commands to inventory tag populations, but also ...
Christian Metzger, Christian Floerkemeier, Philipp...
AAAIDEA
2005
IEEE
15 years 3 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
DSN
2005
IEEE
15 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ACII
2005
Springer
15 years 3 months ago
The HandWave Bluetooth Skin Conductance Sensor
HandWave is a small, wireless, networked skin conductance sensor for affective computing applications. It is used to detect information related to emotional, cognitive, and physica...
Marc Strauss, Carson Reynolds, Stephen Hughes, Kyo...
PARELEC
2000
IEEE
15 years 1 months ago
Parallel Computing Environments and Methods
Recent advances in high-speed networks, rapid improvements in microprocessor design, and availability of highly performing clustering software implementations enables cost-effecti...
Ghassan Fadlallah, Michel Lavoie, Louis-A. Dessain...