Sciweavers

13007 search results - page 2540 / 2602
» Wireless and Mobile Networking
Sort
View
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
14 years 3 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
ISMAR
2008
IEEE
14 years 3 months ago
Virtual redlining for civil engineering in real environments
Field workers of utility companies are regularly engaged in outdoor tasks such as network planning, maintenance and inspection of underground infrastructure. Redlining is the term...
Gerhard Schall, Erick Méndez, Dieter Schmal...
ISORC
2008
IEEE
14 years 3 months ago
A Flexible Trust Model for Distributed Service Infrastructures
Recent years have witnessed the emergence and rapid growth of distributed service infrastructures such as mobile ad hoc networks, P2P, PlanetLab and Grids. In such distributed inf...
Zhaoyu Liu, Stephen S. Yau, Dichao Peng, Yin Yin
SASO
2008
IEEE
14 years 3 months ago
A Robust Audit Mechanism to Prevent Malicious Behaviors in Multi-robot Systems
Market-based mechanisms can be used to coordinate self-interested multi-robot systems in fully distributed environments, where by self-interested we mean that each robot agent att...
MyungJoo Ham, Gul A. Agha
VTC
2008
IEEE
129views Communications» more  VTC 2008»
14 years 3 months ago
On Parallelizing the CryptMT Stream Cipher
Abstract—Fast stream ciphers are used extensively for encrypted data transmission in mobile networks and over multigigabit links. CryptMT, a recently proposed stream cipher, is o...
Deian Stefan, David B. Nummey, Jared Harwayne-Gida...
« Prev « First page 2540 / 2602 Last » Next »