Sciweavers

10044 search results - page 2001 / 2009
» Authentication in Wireless Networks
Sort
View
141
Voted
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
15 years 4 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
148
Voted
CHI
2005
ACM
15 years 4 months ago
Urban probes: encountering our emerging urban atmospheres
Urban Atmospheres captures a unique, synergistic moment – expanding urban populations, rapid adoption of Bluetooth mobile devices, tiny ad hoc sensor networks, and the widesprea...
Eric Paulos, Tom Jenkins
152
Voted
DIALM
2008
ACM
179views Algorithms» more  DIALM 2008»
15 years 4 months ago
Distance graphs: from random geometric graphs to Bernoulli graphs and between
A random geometric graph G(n, r) is a graph resulting from placing n points uniformly at random on the unit area disk, and connecting two points iff their Euclidean distance is at ...
Chen Avin
139
Voted
HVEI
2010
15 years 4 months ago
A subjective study to evaluate video quality assessment algorithms
Automatic methods to evaluate the perceptual quality of a digital video sequence have widespread applications wherever the end-user is a human. Several objective video quality ass...
Kalpana Seshadrinathan, Rajiv Soundararajan, Alan ...
156
Voted
AAAI
2006
15 years 4 months ago
A Multi Agent Approach to Vision Based Robot Scavenging
This paper proposes a design for our entry into the 2006 AAAI Scavenger Hunt Competition and Robot Exhibition. We will be entering a scalable two agent system consisting of off-th...
Kamil Wnuk, Brian Fulkerson, Jeremi Sudol
« Prev « First page 2001 / 2009 Last » Next »