Sciweavers

43190 search results - page 8583 / 8638
» Can Development Be Designed
Sort
View
TC
2008
13 years 9 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
INFORMATICALT
2007
171views more  INFORMATICALT 2007»
13 years 9 months ago
E-Learning Documentation of Historical Living Systems with 3-D Modeling Functionality
The innovations and improvements in digital imaging sensors and scanners, computer modeling, haptic equipments and e-learning technology, as well as the availability of many powerf...
Athanasios D. Styliadis
TCOM
2008
270views more  TCOM 2008»
13 years 9 months ago
Relay assisted F/TDMA ad hoc networks: node classification, power allocation and relaying strategies
This paper considers the design of relay assisted F/TDMA ad hoc networks with multiple relay nodes each of which assists the transmission of a predefined subset of source nodes to ...
Semih Serbetli, Aylin Yener
TCOM
2008
126views more  TCOM 2008»
13 years 9 months ago
Distributed measurements for estimating and updating cellular system performance
We investigate the use of distributed measurements for estimating and updating the performance of a cellular system. Specifically, we discuss the number and placement of sensors in...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
TCOM
2008
192views more  TCOM 2008»
13 years 9 months ago
Joint source coding, routing and power allocation in wireless sensor networks
This paper proposes a cross-layer optimization framework for the wireless sensor networks. In a wireless sensor network, each sensor makes a local observation of the underlying phy...
Jun Yuan, Wei Yu
« Prev « First page 8583 / 8638 Last » Next »