Sciweavers

273 search results - page 38 / 55
» Bayesian Communication under Rough Sets Information
Sort
View
ESORICS
2008
Springer
13 years 8 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
IWACA
1994
96views Multimedia» more  IWACA 1994»
13 years 10 months ago
A Service Kernel for Multimedia Endstations
Quality of Service (QoS) guarantees for delay sensitive networked multimedia applications, such as teleoperation, must be application-to-application. We describe a set of services...
Klara Nahrstedt, Jonathan M. Smith
CHI
2009
ACM
14 years 1 months ago
Time sequences
Visualisations of dynamic data change in appearance over time, reflecting changes in the underlying data, be that the development of a social network, or the addition or removal o...
Ross Shannon, Aaron J. Quigley, Paddy Nixon
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...
ICC
2007
IEEE
116views Communications» more  ICC 2007»
13 years 10 months ago
Robust Power Allocation for Amplify-and-Forward Relay Networks
Relay power allocation has been shown to provide substantial performance gain in wireless relay networks when perfect global channel state information (CSI) is available. In this p...
Tony Q. S. Quek, Moe Z. Win, Hyundong Shin, Marco ...