Sciweavers

15379 search results - page 108 / 3076
» Protecting users from
Sort
View
JTAER
2010
147views more  JTAER 2010»
13 years 6 months ago
Privacy Issues for Online Personal Photograph Collections
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. Howeve...
Sally Jo Cunningham, Masood Masoodian, Anne Adams
TSP
2010
13 years 2 months ago
Resource allocation for downlink cellular OFDMA systems: part I: optimal allocation
In this pair of papers (Part I and Part II in this issue), we investigate the issue of power control and subcarrier assignment in a sectorized two-cell downlink OFDMA system impai...
Nassar Ksairi, Pascal Bianchi, Philippe Ciblat, Wa...
AICT
2010
IEEE
240views Communications» more  AICT 2010»
12 years 11 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 8 months ago
Ownership protection of shape datasets with geodesic distance preservation
Protection of one's intellectual property is a topic with important technological and legal facets. The significance of this issue is amplified nowadays due to the ease of da...
Michail Vlachos, Claudio Lucchese, Deepak Rajan, P...
ICC
2007
IEEE
14 years 2 months ago
Performance of Dedicated Path Protection in Transmission-Impaired DWDM Networks
— There has been a significant amount of recent research on routing and wavelength assignment for DWDM networks suffering from physical layer transmission impairments. These alg...
Yuxiang Zhai, Yvan Pointurier, Suresh Subramaniam,...