Sciweavers

10044 search results - page 2001 / 2009
» Authentication in Wireless Networks
Sort
View
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
14 years 25 days ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
CHI
2005
ACM
14 years 24 days ago
Urban probes: encountering our emerging urban atmospheres
Urban Atmospheres captures a unique, synergistic moment – expanding urban populations, rapid adoption of Bluetooth mobile devices, tiny ad hoc sensor networks, and the widesprea...
Eric Paulos, Tom Jenkins
DIALM
2008
ACM
179views Algorithms» more  DIALM 2008»
14 years 19 days ago
Distance graphs: from random geometric graphs to Bernoulli graphs and between
A random geometric graph G(n, r) is a graph resulting from placing n points uniformly at random on the unit area disk, and connecting two points iff their Euclidean distance is at ...
Chen Avin
HVEI
2010
14 years 9 days ago
A subjective study to evaluate video quality assessment algorithms
Automatic methods to evaluate the perceptual quality of a digital video sequence have widespread applications wherever the end-user is a human. Several objective video quality ass...
Kalpana Seshadrinathan, Rajiv Soundararajan, Alan ...
AAAI
2006
14 years 7 days ago
A Multi Agent Approach to Vision Based Robot Scavenging
This paper proposes a design for our entry into the 2006 AAAI Scavenger Hunt Competition and Robot Exhibition. We will be entering a scalable two agent system consisting of off-th...
Kamil Wnuk, Brian Fulkerson, Jeremi Sudol
« Prev « First page 2001 / 2009 Last » Next »