Sciweavers

1076 search results - page 121 / 216
» Quantifying WiMAX Performance
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 3 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
SECON
2007
IEEE
14 years 3 months ago
Query privacy in wireless sensor networks
— Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions but ...
Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pea...
LSMS
2007
Springer
14 years 3 months ago
A Simulation Study on the Encoding Mechanism of Retinal Ganglion Cell
Understanding how the retina encodes visual information is a key issue for the development of a retinal prosthesis. To study this issue, the neural retina is modeled as a retina mo...
Chao-Feng Cai, Pei-Ji Liang, Pu-Ming Zhang
IPPS
2006
IEEE
14 years 2 months ago
The robot software communications architecture (RSCA): embedded middleware for networked service robots
In this paper, we present a robot middleware technology named Robot Software Communications Architecture (RSCA) for its use in networked home service robots. The RSCA provides a s...
Seongsoo Hong, Jaesoo Lee, Hyeonsang Eom, Gwangil ...
CASES
2006
ACM
14 years 2 months ago
A case study of multi-threading in the embedded space
The continuing miniaturization of technology coupled with wireless networks has made it feasible to physically embed sensor network systems into the environment. Sensor net proces...
Greg Hoover, Forrest Brewer, Timothy Sherwood