Sciweavers

920 search results - page 117 / 184
» Selecting Secure Passwords
Sort
View
ICASSP
2008
IEEE
15 years 9 months ago
An audio watermarking method based on molecular matching pursuit
In this paper we introduce a new watermarking model combining a joint time frequency (TF) representation using the molecular matching pursuit (MMP) algorithm and a psychoacoustic ...
Mathieu Parvaix, Sridhar Krishnan, Cornel Ioana
TRIDENTCOM
2006
IEEE
15 years 9 months ago
Barcelona's open access network testbed
Abstract— This paper describes the implementation and deployment of a novel architecture for a metropolitan open wireless access network, shared among different service providers...
Jaume Barceló, Carlos Macián, Jorge ...
CAD
2000
Springer
15 years 3 months ago
Lessons learned developing protocols for the industrial virtual enterprise
The protocols selected and developed by the NIIIP Consortium have been validated in three end-of-cycle demonstrations. In each cycle, a team with expertise in technical product da...
Martin Hardwick, K. C. Morris, David L. Spooner, T...
124
Voted
COMSUR
2008
110views more  COMSUR 2008»
15 years 2 months ago
Service discovery for mobile ad hoc networks: A survey of issues and techniques
This paper surveys research in service advertising, discovery and selection for mobile ad hoc networks (MANETs) and related issues. We include a categorization of service discovery...
Christopher N. Ververidis, George C. Polyzos
CORR
2011
Springer
188views Education» more  CORR 2011»
14 years 10 months ago
Composition of Management System for Smart Homes
—The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm...
Mark Sh. Levin, Aliaksei Andrushevich, Alexander K...