Sciweavers

271 search results - page 24 / 55
» Context-agile encryption for high speed communication networ...
Sort
View
MVA
2000
132views Computer Vision» more  MVA 2000»
13 years 7 months ago
Human Face Image Creation for Virtual Space Teleconferencing Using Camera Input Images
Since the human face plays an important role in man-to-man communication, systems enabling distant users to communicate while viewing each others' face have been demanded. Re...
Hajime Sato, Nobuyoshi Terashima, Hideyoshi Tomina...
IJSN
2008
145views more  IJSN 2008»
13 years 7 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
TPDS
2002
105views more  TPDS 2002»
13 years 7 months ago
HiPER: A Compact Narrow Channel Router with Hop-by-Hop Error Correction
Multiprocessor architectures demand efficient interprocessor communication to maximize system utilization and performance. To meet future demands, these interconnects must communic...
Phil May, Santithorn Bunchua, D. Scott Wills
CANPC
1998
Springer
13 years 12 months ago
The Remote Enqueue Operation on Networks of Workstations
Abstract. Modern networks of workstations connected by Gigabit networks have the ability to run high-performance computing applications at a reasonable performance, but at a signi ...
Evangelos P. Markatos, Manolis Katevenis, Penny Va...
CCS
2005
ACM
14 years 1 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia