Sciweavers

15885 search results - page 2919 / 3177
» The Modest Software Engineer
Sort
View
COMSWARE
2006
IEEE
15 years 8 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
134
Voted
COMSWARE
2006
IEEE
15 years 8 months ago
Design keys to adapt web prefetching algorithms to environment conditions
— This paper focuses on the design process of web prefetching algorithms. The main goal of prefetching techniques in web is to reduce user perceived latency. Since these techniqu...
Josep Domènech, Julio Sahuquillo, Ana Pont,...
123
Voted
COMSWARE
2006
IEEE
15 years 8 months ago
Exploiting multi-channel clustering for power efficiency in sensor networks
Sensor networks typically comprise of a number of inexpensive small devices with processing, communication and sensing abilities that collaborate to perform a common task. Sensor d...
Ashima Gupta, Chao Gui, Prasant Mohapatra
107
Voted
COMSWARE
2006
IEEE
15 years 8 months ago
Middleware for wireless sensor networks: A survey
Given the fast growing technological progress in microelectronics and wireless communication devices, in the near future, it is foreseeable that Wireless Sensor Networks (WSN) wil...
Salem Hadim, Nader Mohamed
117
Voted
COMSWARE
2006
IEEE
15 years 8 months ago
Trust-propagation based authentication protocol in multihop wireless home networks
Abstract— In this paper, we propose an authentication and secure channel establishment protocol that is reliable and adaptable for multihop wireless home networks. The main idea ...
Han Sang Kim, Jin Wook Lee, Sandeep K. S. Gupta, Y...
« Prev « First page 2919 / 3177 Last » Next »