Sciweavers

451 search results - page 38 / 91
» A New Approach to Survivability of Connection Oriented Netwo...
Sort
View
MDM
2001
Springer
209views Communications» more  MDM 2001»
14 years 2 days ago
Energy-Efficient Transaction Management for Real-Time Mobile Databases in Ad-Hoc Network Environments
In an ad-hoc mobile network architecture, all the mobile hosts (MHs) are connected with each other through a wireless network that has a frequently changing topology. This type of ...
Le Gruenwald, Shankar M. Banik
DATE
2010
IEEE
163views Hardware» more  DATE 2010»
13 years 12 months ago
Efficient High-Level modeling in the networking domain
-- Starting Electronic System Level (ESL) design flows with executable High-Level Models (HLMs) has the potential to sustainably improve productivity. However, writing good HLMs fo...
Christian Zebelein, Joachim Falk, Christian Haubel...
TSMC
2010
13 years 2 months ago
Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions
Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness...
Xinbo Gao, Cheng Deng, Xuelong Li, Dacheng Tao
ICDM
2007
IEEE
182views Data Mining» more  ICDM 2007»
14 years 2 months ago
Co-ranking Authors and Documents in a Heterogeneous Network
The problem of evaluating scientific publications and their authors is important, and as such has attracted increasing attention. Recent graph-theoretic ranking approaches have d...
Ding Zhou, Sergey A. Orshanskiy, Hongyuan Zha, C. ...
AINA
2010
IEEE
13 years 6 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...