Sciweavers

34 search results - page 6 / 7
» Mobile Information Presentation Schemes for Supra-adaptive L...
Sort
View
DIM
2005
ACM
13 years 9 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
IPPS
2007
IEEE
14 years 1 months ago
Optimal Assignment of a Tree-Structured Context Reasoning Procedure onto a Host-Satellites System
In this paper, we study the problem of an optimal assignment of a tree-structured context reasoning procedure onto the computation resources in a hostsatellites configuration. The...
Hailiang Mei, Pravin Pawar, Ing Widya
ICAD
2004
13 years 9 months ago
Soundserver: Data Sonification On-Demand for Computational Instances
The rapid accumulation of large collections of data has created the need for efficient and intelligent schemes for knowledge extraction and results analysis. The resulting informa...
Jorge Cardoso, Jos Carvalho, Luís Teixeira,...
ICASSP
2010
IEEE
13 years 7 months ago
Enhanced trellis based vector quantization for coordinated beamforming
This paper presents two techniques to boost the quantization performance of trelli-based beamforming vector quantization schemes [?], [?]. It is well known that tail-biting trelli...
Chun Kin Au-Yeung, Shahab Sanayei
WCNC
2010
IEEE
13 years 11 months ago
Socially-Aware Publish/Subscribe System for Human Networks
Abstract—The development of modern communication technologies fosters human networks (HUNETs)—an information dissemination platform comprised of human-carried wirelessenabled d...
Yaxiong Zhao, Jie Wu