Sciweavers

418 search results - page 22 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
MSWIM
2005
ACM
14 years 1 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
ICIP
2009
IEEE
14 years 9 months ago
Combining Multimodal And Temporal Contextual Information For Semantic Video Analysis
In this paper, a graphical modeling-based approach to semantic video analysis is presented for jointly realizing modality fusion and temporal context exploitation. Overall, the ex...
IJCNN
2008
IEEE
14 years 2 months ago
Feature selection based on kernel discriminant analysis for multi-class problems
— We propose a feature selection criterion based on kernel discriminant analysis (KDA) for an -class problem, which finds eigenvectors on which the projected class data are loca...
Tsuneyoshi Ishii, Shigeo Abe
CHI
2007
ACM
14 years 8 months ago
Home networking and HCI: what hath god wrought?
For much of the industrialized world, network connectivity in the home is commonplace. Despite the large number of networked homes, even the most technically savvy people can have...
Erika Shehan, W. Keith Edwards
WISEC
2009
ACM
14 years 2 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru