Sciweavers

99 search results - page 11 / 20
» The Location Stack: A Layered Model for Location in Ubiquito...
Sort
View
BROADNETS
2007
IEEE
14 years 1 months ago
Retransmission in OBS networks with fiber delay lines
— While most transmission schemes in OBS networks relegate retransmission to higher protocol layers, the scheme proposed in this paper reduces retransmission delays by exploiting ...
Kyung Joon Kwak, Edward G. Coffman Jr.
ICPR
2008
IEEE
14 years 8 months ago
Thin layer tissue classification for electronic cleansing of CT colonography data
CT colonography (CTC) is a rapidly evolving technique to screen for colorectal polyps. Fecal residue may occlude or, reversely, mimic polyps. Electronic cleansing aims at removing...
Vincent Frans van Ravesteijn, Frans M. Vos, Iwo Se...
CSE
2009
IEEE
14 years 2 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
EUSAI
2004
Springer
13 years 11 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...
BROADNETS
2005
IEEE
14 years 1 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang