Sciweavers

89 search results - page 15 / 18
» Connectivity and synchronization of Vicsek model
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 5 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
ICC
2009
IEEE
111views Communications» more  ICC 2009»
14 years 2 months ago
A Study of the Percolation Threshold for k-Collaborative Wireless Networks
—How to efficiently use the air interface is a crucial issue in wireless networks. In order to improve the performance, mechanisms have been proposed to improve the reach and th...
Cédric Westphal
ICASSP
2007
IEEE
14 years 1 months ago
Real Time 3D Avatar Transmission using Cylinder Mapping
In this paper, we propose a client-sever system, which accomplishes acquisition, transmission and reconstruction of the 3D shape at a remote location in real time. The server cons...
Shin-ichiro Takahashi, Masaaki Ikehara, Ishtiaq Ra...
ICAD
2004
13 years 8 months ago
Emotionface: Prototype Facial Expression Display of Emotion in Music
EmotionFace is a software interface for visually displaying the self-reported emotion expressed by music. Taken in reverse, it can be viewed as a facial expression whose auditory ...
Emery Schubert
ICWN
2003
13 years 8 months ago
Adapting Content for Mobile Devices in Heterogeneous Collaboration Environments
The portability of new miniaturized devices, together with their ability to connect conveniently to networks in different places, makes mobile computing possible. Recent advances ...
Sangmi Lee, Sung Hoon Ko, Geoffrey Fox