Sciweavers

811 search results - page 114 / 163
» Refactoring Using Type Constraints
Sort
View
MOBIHOC
2007
ACM
14 years 8 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
EMS
2009
IEEE
14 years 3 months ago
Accurate Timeliness Simulations for Real-Time Wireless Sensor Networks
—The use of wireless sensor networks is rapidly growing in various types of applications that benefit from spatially distributed data collection. Some of these applications, suc...
Jérôme Rousselot, Jean-Dominique Deco...
AGILE
2009
Springer
295views GIS» more  AGILE 2009»
14 years 3 months ago
Enhancing 3D City Models with Heterogeneous Spatial Information: Towards 3D Land Information Systems
Spatial and georeferenced information plays an important role in urban land management processes such as spatial planning and environmental management. As many of the processes ar...
Lutz Ross, Jannes Bolling, Jürgen Döllne...
PIMRC
2008
IEEE
14 years 3 months ago
Performance of VoIP services over 3GPP WCDMA networks
We analyze the performance ofvoice services over 3GPP WCDMA Networks for Release 99 and Release 7 deployments. We show, by using simulations, that the system capacity of Release 7 ...
Ozcan Ozturk, Vinay Chande, Haitong Sun, Mehmet Ya...
ICB
2007
Springer
134views Biometrics» more  ICB 2007»
14 years 3 months ago
Singular Points Analysis in Fingerprints Based on Topological Structure and Orientation Field
Abstract. As an important feature of fingerprints, singular points (includingcores and deltas) not only represent the local ridge pattern characteristics, but also determine the to...
Jie Zhou, Jinwei Gu, David Zhang