Sciweavers

461 search results - page 58 / 93
» Fundamentals of concern manipulation
Sort
View
AUTOID
2005
IEEE
14 years 1 months ago
Statistical Models for Assessing the Individuality of Fingerprints
Following Daubert in 1993, forensic evidence based on fingerprints was first challenged in the 1999 case of USA vs. Byron Mitchell, and subsequently, in 20 other cases involving...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain
DEXAW
2005
IEEE
140views Database» more  DEXAW 2005»
14 years 1 months ago
Effective Dynamic Replication in Wide-Area Network Environments: A Perspective
The unprecedented growth of data at geographically distributed locations coupled with tremendous improvement in networking capabilities over the last decade strongly motivate the ...
Anirban Mondal, Masaru Kitsuregawa
ICMB
2005
IEEE
114views Business» more  ICMB 2005»
14 years 1 months ago
WLAN Communities and Internet Access Sharing: A Regulatory Overview
The widespread adoption of wireless LAN has paved the way for the emergence of a compelling alternative to cellular networks for obtaining Internet access on the move. This has ge...
Giovanni Camponovo, Davide Cerutti
LCN
2005
IEEE
14 years 1 months ago
Approximate Coverage in Wireless Sensor Networks
— Recent advances in microelectronic technology have made it possible to construct compact and inexpensive wireless sensors. Sensor networks have received significant attention ...
Yuzhen Liu, Weifa Liang
IMC
2005
ACM
14 years 1 months ago
Inferring and Debugging Path MTU Discovery Failures
If a host can send packets larger than an Internet path can forward, it relies on the timely delivery of Internet Control Message Protocol (ICMP) messages advising that the packet...
Matthew J. Luckie, Kenjiro Cho, Bill Owens