Sciweavers

2237 search results - page 301 / 448
» Storing information with extractors
Sort
View
WMCSA
2008
IEEE
14 years 5 months ago
Distributed authentication for low-cost wireless networks
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the c...
Sridhar Machiraju, Hao Chen, Jean Bolot
AINA
2007
IEEE
14 years 5 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
CISS
2007
IEEE
14 years 5 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid
ICC
2007
IEEE
14 years 5 months ago
Dynamic Lightpath Establishment for Service Differentiation Based on Optimal MDP Policy in All-Optical Networks with Wavelength
— In this paper, we propose a dynamic lightpath establishment method for service differentiation in all-optical WDM networks with the capability of full-range wavelength conversi...
Takuji Tachibana, Shoji Kasahara, Kenji Sugimoto
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
14 years 5 months ago
Granularity Conscious Modeling for Probabilistic Databases
The convergence of embedded sensor systems and stream query processing suggests an important role for database techniques, in managing data that only partially – and often inacc...
Eirinaios Michelakis, Daisy Zhe Wang, Minos N. Gar...