Sciweavers

52
Voted
JNCA
2010
85views more  JNCA 2010»
14 years 4 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
62
Voted
JNCA
2010
41views more  JNCA 2010»
14 years 4 months ago
Combining features for distorted fingerprint matching
Kai Cao, Xin Yang, Xunqiang Tao, Peng Li, Yali Zan...
72
Voted
JNCA
2010
55views more  JNCA 2010»
14 years 4 months ago
An authentication scheme for locating compromised sensor nodes in WSNs
Youtao Zhang, Jun Yang 0002, Weijia Li, Linzhang W...
61
Voted
JNCA
2010
244views more  JNCA 2010»
14 years 4 months ago
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang ...
63
Voted
JNCA
2010
94views more  JNCA 2010»
14 years 8 months ago
Distributed autonomic management: An approach and experiment towards managing service-centric networks
This paper describes a novel approach for managing service-centric communications networks called distributed autonomic management (DAM). Current approaches to network management ...
Pradeep Ray, Nandan Parameswaran, Lundy Lewis
88
Voted
JNCA
2010
106views more  JNCA 2010»
14 years 8 months ago
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
Today’s web applications are more collaborative and are using the standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware...
Praveen Madiraju, Srilaxmi Malladi, Janaka Balasoo...
66
Voted
JNCA
2010
67views more  JNCA 2010»
14 years 8 months ago
Adaptation of RSS feeds based on the user profile and on the end device
Christos Bouras, Vassilis Poulopoulos, Vassilis Ts...
68
Voted
JNCA
2010
49views more  JNCA 2010»
14 years 8 months ago
QoS multicast tree construction in IP/DWDM optical internet by bio-inspired algorithms
Hui Cheng, Xingwei Wang, Shengxiang Yang, Min Huan...