Sciweavers

534 search results - page 61 / 107
» One more bit is enough
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
ADHOCNETS
2010
Springer
13 years 6 months ago
Event Detection in Wireless Sensor Networks - Can Fuzzy Values Be Accurate?
Event detection is a central component in numerous wireless sensor network (WSN) applications. In spite of this, the area of event description has not received enough attention. Th...
Krasimira Kapitanova, Sang Hyuk Son, Kyoung-Don Ka...
BMVC
2010
13 years 6 months ago
Robust Camera Calibration using Inaccurate Targets
Accurate intrinsic camera calibration is essential to any computer vision task that involves image based measurements. Given its crucial role with respect to precision, a large nu...
Andrea Albarelli, Emanuele Rodolà, Andrea T...
INFOCOM
2010
IEEE
13 years 6 months ago
Efficient Similarity Estimation for Systems Exploiting Data Redundancy
Many modern systems exploit data redundancy to improve efficiency. These systems split data into chunks, generate identifiers for each of them, and compare the identifiers among ot...
Kanat Tangwongsan, Himabindu Pucha, David G. Ander...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 5 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha