Sciweavers

1683 search results - page 292 / 337
» Power Management in Networked Devices
Sort
View
ICDIM
2007
IEEE
14 years 5 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel
IPPS
2006
IEEE
14 years 4 months ago
Chedar: peer-to-peer middleware
In this paper we present a new peer-to-peer (P2P) middleware called CHEap Distributed ARchitecture (Chedar). Chedar is totally decentralized and can be used as a basis for P2P app...
Annemari Auvinen, Mikko Vapa, Matthieu Weber, Niko...
KDD
2008
ACM
164views Data Mining» more  KDD 2008»
14 years 11 months ago
Microscopic evolution of social networks
We present a detailed study of network evolution by analyzing four large online social networks with full temporal information about node and edge arrivals. For the first time at ...
Jure Leskovec, Lars Backstrom, Ravi Kumar, Andrew ...
SIGMOD
2008
ACM
179views Database» more  SIGMOD 2008»
14 years 11 months ago
BibNetMiner: mining bibliographic information networks
Online bibliographic databases, such as DBLP in computer science and PubMed in medical sciences, contain abundant information about research publications in different fields. Each...
Yizhou Sun, Tianyi Wu, Zhijun Yin, Hong Cheng, Jia...
PERCOM
2008
ACM
13 years 10 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti