Sciweavers

5511 search results - page 889 / 1103
» Security for Network Places
Sort
View
160
Voted
ICPADS
2008
IEEE
15 years 10 months ago
SkyEye.KOM: An Information Management Over-Overlay for Getting the Oracle View on Structured P2P Systems
In order to ease the development and maintenance of more complex P2P applications, which combine multiple P2P functionality (e.g. streaming and dependable storage), we suggest to ...
Kalman Graffi, Aleksandra Kovacevic, Song Xiao, Ra...
ICRA
2008
IEEE
204views Robotics» more  ICRA 2008»
15 years 10 months ago
Active exploration and keypoint clustering for object recognition
— Object recognition is a challenging problem for artificial systems. This is especially true for objects that are placed in cluttered and uncontrolled environments. To challenge...
Gert Kootstra, Jelmer Ypma, Bart de Boer
129
Voted
ISCC
2008
IEEE
171views Communications» more  ISCC 2008»
15 years 10 months ago
The operation mode selection in FMIPv6
The Fast Handover for Mobile IPv6 (FMIPv6) [2] aims at reducing the long handover latency in Mobile IPv6 [1] by fast movement detection and fast binding update. Furthermore, it al...
Bin Liu, Philippe Martins, Philippe Bertin
PIMRC
2008
IEEE
15 years 10 months ago
A Distributed IP Mobility Approach for 3G SAE
—Future generations of mobile operator networks, based on an all-IP-based flat architecture and a multitude of different access technologies, require a proper IP-based mobility ...
Mathias Fischer, Frank-Uwe Andersen, Andreas K&oum...
SASO
2008
IEEE
15 years 10 months ago
Cells Are Plausible Targets for High-Level Spatial Languages
—High level languages greatly increase the power of a programmer at the cost of programs that consume more s than those written at a lower level of abstraction. This inefficienc...
Jacob Beal, Jonathan Bachrach