Sciweavers

1840 search results - page 291 / 368
» The Capacity of String-Duplication Systems
Sort
View
ISPA
2005
Springer
14 years 1 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
IWINAC
2005
Springer
14 years 1 months ago
Model Performance for Visual Attention in Real 3D Color Scenes
Abstract. Visual attention is the ability of a vision system, be it biological or artificial, to rapidly detect potentially relevant parts of a visual scene. The saliency-based mo...
Heinz Hügli, Timothée Jost, Nabil Ouer...
PAM
2005
Springer
14 years 1 months ago
Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network
The growth of wireless LANs has brought the expectation for high-bitrate streaming video to wireless PCs. However, it remains unknown how to best adapt video to wireless channel ch...
Feng Li, Jae Chung, Mingzhe Li, Huahui Wu, Mark Cl...
PDCAT
2005
Springer
14 years 1 months ago
A Scheduling Method for Divisible Workload Problem in Grid Environments
Scheduling divisible workloads in distributed systems has been one of the interesting research problems over the last few years. Most of the scheduling algorithms previously intro...
Nguyen The Loc, Said Elnaffar, Takuya Katayama, Tu...
CF
2004
ACM
14 years 1 months ago
A framework for resource discovery in pervasive computing for mobile aware task execution
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide a user the transparency of anywhere, anyplace, anytime computing. Pervasive compu...
K. Kalapriya, S. K. Nandy, Deepti Srinivasan, R. U...