Sciweavers

423 search results - page 82 / 85
» Design of a Password-based Authentication Method for Wireles...
Sort
View
FGCN
2008
IEEE
131views Communications» more  FGCN 2008»
14 years 1 months ago
Object Tracking of Mobile Robot Using Moving Color and Shape Information for the Aged Walking
A mobile robot with various types of sensors via ubiquitous networks is introduced. We designed a mobile robot composed of TCP/IP network, wireless camera and several sensors in a...
Sanghoon Kim, Sangmu Lee, Seungjong Kim
MOBICOM
2003
ACM
14 years 18 days ago
Geographic routing without location information
For many years, scalable routing for wireless communication systems was a compelling but elusive goal. Recently, several routing algorithms that exploit geographic information (e....
Ananth Rao, Christos H. Papadimitriou, Scott Shenk...
CODES
2003
IEEE
14 years 19 days ago
Synthesis of real-time embedded software with local and global deadlines
Current methods cannot synthesize real-time embedded software applications when the global deadline of a task is shorter than the total of all local deadlines along a critical pat...
Pao-Ann Hsiung, Cheng-Yi Lin
DCC
2009
IEEE
14 years 8 months ago
Multi Level Multiple Descriptions
Multiple Description (MD) source coding is a method to overcome unexpected information loss in a diversity system such as the internet, or a wireless network. While classic MD cod...
Tal A. Beery, Ram Zamir
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash