Sciweavers

6120 search results - page 1116 / 1224
» The Power of Linear Functions
Sort
View
ACSC
2006
IEEE
14 years 4 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
SMI
2006
IEEE
168views Image Analysis» more  SMI 2006»
14 years 4 months ago
Spherical Wavelet Descriptors for Content-based 3D Model Retrieval
The description of 3D shapes with features that possess descriptive power and invariant under similarity transformations is one of the most challenging issues in content based 3D ...
Hamid Laga, Hiroki Takahashi, Masayuki Nakajima
SUTC
2006
IEEE
14 years 4 months ago
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks
- In this paper, we describe a group key management protocol for hierarchical sensor networks where instead of using pre-deployed keys, each sensor node generates a partial key dyn...
Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bha...
AICCSA
2005
IEEE
168views Hardware» more  AICCSA 2005»
14 years 3 months ago
A dynamic range resource reservation protocol for QoS support in wireless networks
— Mobile ad hoc networks (MANETs) provide a powerful and dynamic platform to enable mobile computers to establish communications without an existing infrastructure. In order to p...
Imad Jawhar, Jie Wu
SAINT
2005
IEEE
14 years 3 months ago
Adaptive Semantic Support Provisioning in Mobile Internet Environments
The Mobile Internet scenario encourages the design and development of context-aware applications that provide results depending on context information, such as the relative positi...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
« Prev « First page 1116 / 1224 Last » Next »