Sciweavers

151 search results - page 24 / 31
» Secure transmission of sensitive data using multiple channel...
Sort
View
MOBICOM
1998
ACM
13 years 11 months ago
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administra...
Josh Broch, David A. Maltz, David B. Johnson, Yih-...
ISI
2007
Springer
14 years 1 months ago
DOTS: Detection of Off-Topic Search via Result Clustering
— Often document dissemination is limited to a “need to know” basis so as to better maintain organizational trade secrets. Retrieving documents that are off-topic to a user...
Nazli Goharian, Alana Platt
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
13 years 11 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
VTC
2008
IEEE
196views Communications» more  VTC 2008»
14 years 1 months ago
Block Equalization and Generalized MLSE Arbitration for the HSPA WCDMA Uplink
Abstract— High Speed Packet Access (HSPA), the latest evolution of the Wideband Code Division Multiple Access (WCDMA) standard, provides higher uplink data rates using higher-ord...
Gregory E. Bottomley
BMCBI
2008
143views more  BMCBI 2008»
13 years 7 months ago
catmap: Case-control And TDT Meta-Analysis Package
Background: Risk for complex disease is thought to be controlled by multiple genetic risk factors, each with small individual effects. Meta-analyses of several independent studies...
Kristin K. Nicodemus