Sciweavers

3999 search results - page 718 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
IPSN
2010
Springer
15 years 9 months ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...
DIM
2009
ACM
15 years 8 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
126
Voted
ISORC
2002
IEEE
15 years 7 months ago
Reactive Objects
Object-oriented, concurrent, and event-based programming models provide a natural framework in which to express the behavior of distributed and embedded software systems. However,...
Johan Nordlander, Mark P. Jones, Magnus Carlsson, ...
ICCV
2007
IEEE
15 years 8 months ago
A reliable skin mole localization scheme
Mole pattern changes are important cues in detecting melanoma at an early stage. As a first step to automatically register mole pattern changes from skin images, this paper prese...
Taeg Sang Cho, William T. Freeman, Hensin Tsao
HUC
2010
Springer
15 years 2 months ago
Examining micro-payments for participatory sensing data collections
The rapid adoption of mobile devices that are able to capture and transmit a wide variety of sensing modalities (media and location) has enabled a new data collection paradigm - p...
Sasank Reddy, Deborah Estrin, Mark H. Hansen, Mani...