Sciweavers

23201 search results - page 4602 / 4641
» Rewriting Systems with Data
Sort
View
ADT
2005
13 years 9 months ago
Multimedia communication in wireless sensor networks
Abstract-- The technological advances in Micro ElectroMechanical Systems (MEMS) and wireless communications have enabled the realization of wireless sensor networks (WSN) comprised...
Eren Gürses, Özgür B. Akan
IJMI
2007
86views more  IJMI 2007»
13 years 9 months ago
Using argumentation to extract key sentences from biomedical abstracts
s from Biomedical Abstracts Patrick Rucha , Celia Boyer c , Christine Chichesterb , Imad Tbahritiab Antoine Geissbühlera , Paul Fabrya , Julien Gobeilla , Violaine Pilletab , Diet...
Patrick Ruch, Célia Boyer, Christine Chiche...
IJMSO
2007
109views more  IJMSO 2007»
13 years 9 months ago
MOQ: Web services ontologies for QoS and general quality evaluations
When describing Web services, one of the obvious aspects that needs representing is Quality of Service” (QoS), the capability of a Web service to meet an acceptable level of ser...
Henry M. Kim, Arijit Sengupta, Joerg Evermann
IJNSEC
2007
253views more  IJNSEC 2007»
13 years 9 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd
IJSN
2007
129views more  IJSN 2007»
13 years 8 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...
« Prev « First page 4602 / 4641 Last » Next »