Sciweavers

3497 search results - page 694 / 700
» Mining in a mobile environment
Sort
View
CEE
2007
110views more  CEE 2007»
13 years 7 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...
IJNSEC
2006
134views more  IJNSEC 2006»
13 years 7 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
JCB
2006
125views more  JCB 2006»
13 years 7 months ago
Hypothesis Generation in Signaling Networks
Biological signaling networks comprise the chemical processes by which cells detect and respond to changes in their environment. Such networks have been implicated in the regulati...
Derek A. Ruths, Luay Nakhleh, M. Sriram Iyengar, S...
JODL
2006
131views more  JODL 2006»
13 years 7 months ago
Keyframe-based video summarization using Delaunay clustering
Recent advances in technology have made tremendous amount of multimedia information available to the general population. An efficient way of dealing with this new development is t...
Padmavathi Mundur, Yong Rao, Yelena Yesha
MTA
2008
132views more  MTA 2008»
13 years 7 months ago
Peer to peer video streaming in Bluetooth overlays
As Bluetooth is available in most personal and portable terminals (eg, cellular phone, PDA, videocamera, laptop, etc) P2P video streaming through Bluetooth networks is now a reali...
Sewook Jung, Alexander Chang, Mario Gerla