Sciweavers

967 search results - page 88 / 194
» Dimming Cellular Networks
Sort
View
DIM
2007
ACM
15 years 8 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
DIM
2008
ACM
15 years 5 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
CDC
2009
IEEE
179views Control Systems» more  CDC 2009»
15 years 8 months ago
Bayesian network approach to understand regulation of biological processes in cyanobacteria
— Bayesian networks have extensively been used in numerous fields including artificial intelligence, decision theory and control. Its ability to utilize noisy and missing data ...
Thanura R. Elvitigala, Abhay K. Singh, Himadri B. ...
ICPP
1989
IEEE
15 years 8 months ago
A Self-Routing Permutation Network
A self–routing permutation network is a connector which can set its own switches to realize any one-to-one mapping of its inputs onto its outputs. Many permutation networks have...
David M. Koppelman, A. Yavuz Oruç
JNW
2007
135views more  JNW 2007»
15 years 4 months ago
Reliable Integrated Architecture for Heterogeneous Mobile and Wireless Networks
Abstract— The major trend in next-generation or 4G wireless networks (NGWN/4G) is the coexistence of diverse but complementary architectures and wireless access technologies. In ...
Christian Makaya, Samuel Pierre