Sciweavers

1124 search results - page 111 / 225
» Future Challenges
Sort
View
CN
1999
98views more  CN 1999»
15 years 4 months ago
Mobility information for resource management in wireless ATM networks
ZUser mobility poses a significant technical challenge to network resource management in wireless ATM Asynchronous . Z .Transfer Mode networks. In order to guarantee quality of se...
Xuemin Shen, Jon W. Mark
TVLSI
2008
152views more  TVLSI 2008»
15 years 3 months ago
MMV: A Metamodeling Based Microprocessor Validation Environment
With increasing levels of integration of multiple processing cores and new features to support software functionality, recent generations of microprocessors face difficult validati...
Deepak Mathaikutty, Sreekumar V. Kodakara, Ajit Di...
JUCS
2010
162views more  JUCS 2010»
15 years 2 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
TIFS
2010
94views more  TIFS 2010»
15 years 2 months ago
Plastic surgery: a new dimension to face recognition
Abstract—Advancement and affordability is leading to popularity of plastic surgery procedures. Facial plastic surgery can be reconstructive to correct facial feature anomalies or...
Richa Singh, Mayank Vatsa, Himanshu S. Bhatt, Sama...
TKDE
2010
272views more  TKDE 2010»
15 years 2 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta