Sciweavers

844 search results - page 113 / 169
» aim 2004
Sort
View
IPSN
2004
Springer
14 years 1 months ago
Flexible power scheduling for sensor networks
We propose a distributed on-demand power-management protocol for collecting data in sensor networks. The protocol aims to reduce power consumption while supporting fluctuating dem...
Barbara Hohlt, Lance Doherty, Eric A. Brewer
ISCIS
2004
Springer
14 years 1 months ago
Relay Attacks on Bluetooth Authentication and Solutions
We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to bo...
Albert Levi, Erhan Çetintas, Murat Aydos, &...
ISMIR
2004
Springer
79views Music» more  ISMIR 2004»
14 years 1 months ago
Towards a Socio-cultural Compatibility of MIR Systems
Future MIR systems will be of great use and pleasure for potential users. If researchers have a clear picture about their “customers” in mind they can aim at building and eval...
Stephan Baumann, Tim Pohle, Shankar Vembu
ISMIR
2004
Springer
95views Music» more  ISMIR 2004»
14 years 1 months ago
A multi-parametric and redundancy-filtering approach to pattern identification
This paper presents the principles of a new approach aimed at automatically discovering motivic patterns in monodies. It is shown that, for the results to agree with the listener...
Olivier Lartillot
ISPA
2004
Springer
14 years 1 months ago
A Congestion-Aware Search Protocol for Unstructured Peer-to-Peer Networks
Peer-to-Peer (P2P) file sharing is the hottest, fastest growing application on the Internet. When designing Gnutella-like applications, the most important consideration is the sca...
Kin Wah Kwong, Danny H. K. Tsang