Sciweavers

5726 search results - page 1057 / 1146
» Supporting annotations on relations
Sort
View
ACMSE
2006
ACM
14 years 3 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
CASES
2006
ACM
14 years 3 months ago
Methods for power optimization in distributed embedded systems with real-time requirements
Dynamic voltage scaling and sleep state control have been shown to be extremely effective in reducing energy consumption in CMOS circuits. Though plenty of research papers have st...
Razvan Racu, Arne Hamann, Rolf Ernst, Bren Mochock...
HT
2006
ACM
14 years 3 months ago
HT06, tagging paper, taxonomy, Flickr, academic article, to read
In recent years, tagging systems have become increasingly popular. These systems enable users to add keywords (i.e., “tags”) to Internet resources (e.g., web pages, images, vi...
Cameron Marlow, Mor Naaman, Danah Boyd, Marc Davis
IMC
2006
ACM
14 years 3 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
MM
2006
ACM
138views Multimedia» more  MM 2006»
14 years 3 months ago
VirtualTour: an online travel assistant based on high quality images
With the popularity of both travel and Web, more and more people use online travel services to facilitate their travel activities or share their travel experiences. Considering th...
Feng Jing, Lei Zhang, Wei-Ying Ma
« Prev « First page 1057 / 1146 Last » Next »