Sciweavers

323 search results - page 53 / 65
» A Comparison of MPI and Process Networks
Sort
View
CSREASAM
2006
13 years 9 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 7 months ago
Image Pixel Fusion for Human Face Recognition
In this paper we present a technique for fusion of optical and thermal face images based on image pixel fusion approach. Out of several factors, which affect face recognition perfo...
Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita...
JCP
2008
120views more  JCP 2008»
13 years 7 months ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong
JMM2
2008
107views more  JMM2 2008»
13 years 7 months ago
Dynamic Generation of SMIL-Based Multimedia Interfaces
The current heterogeneous world of networks and terminals combined with the generalized mobility of users pose telecommunications operators and service providers the challenge of d...
José Manuel Oliveira, Eurico Carrapatoso
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 7 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...