Sciweavers

1172 search results - page 219 / 235
» MIPv6 experimental evaluation using overlay networks
Sort
View
AINA
2008
IEEE
14 years 2 months ago
Dynamic Cache Invalidation Scheme in IR-Based Wireless Environments
Traditional cache invalidation schemes are not suitable to be employed in wireless environments due to the affections of mobility, energy consumption, and limited bandwidth. Cache ...
Yeim-Kuan Chang, Yi-Wei Ting, Tai-Hong Lin
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 1 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
MOBISYS
2010
ACM
13 years 10 months ago
Growing an organic indoor location system
Most current methods for 802.11-based indoor localization depend on surveys conducted by experts or skilled technicians. Some recent systems have incorporated surveying by users. ...
Jun-geun Park, Ben Charrow, Dorothy Curtis, Jonath...
BMCBI
2008
90views more  BMCBI 2008»
13 years 7 months ago
Ortholog-based protein-protein interaction prediction and its application to inter-species interactions
Background: The rapid growth of protein-protein interaction (PPI) data has led to the emergence of PPI network analysis. Despite advances in high-throughput techniques, the intera...
Sheng-An Lee, Chen-hsiung Chan, Chi-Hung Tsai, Jin...
AINA
2007
IEEE
14 years 2 months ago
An Adaptive Localized Algorithm for Multiple Sensor Area Coverage
— Wireless sensor networks are made up of hundreds of devices deployed over a distant or sensitive field to be monitored. Energy consumption is balanced by taking advantage of t...
Antoine Gallais, Jean Carle