Sciweavers

1332 search results - page 151 / 267
» ideas 2008
Sort
View
TOIT
2008
92views more  TOIT 2008»
15 years 4 months ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara
TON
2008
149views more  TON 2008»
15 years 4 months ago
Building heterogeneous peer-to-peer networks: protocol and analysis
In this paper, we propose a simple protocol for building heterogeneous unstructured peer-to-peer (P2P) networks. The protocol consists of two parts--the joining process and the reb...
Kin Wah Kwong, Danny H. K. Tsang
TON
2008
134views more  TON 2008»
15 years 4 months ago
Efficient broadcasting using network coding
Abstract-- We consider the problem of broadcasting in an adhoc wireless network, where all nodes of the network are sources that want to transmit information to all other nodes. Ou...
Christina Fragouli, Jörg Widmer, Jean-Yves Le...
TON
2008
159views more  TON 2008»
15 years 4 months ago
Optimizing lifetime for continuous data aggregation with precision guarantees in wireless sensor networks
This paper exploits the tradeoff between data quality and energy consumption to extend the lifetime of wireless sensor networks. To obtain an aggregate form of sensor data with pre...
Xueyan Tang, Jianliang Xu
CGF
2005
130views more  CGF 2005»
15 years 4 months ago
A Data-Driven Approach for Real-Time Clothes Simulation
A data-driven approach for real-time processing of clothes, particularly suitable for simulating dresses worn by virtual characters, is proposed. It starts, prior to realtime simu...
Frederic Cordier, Nadia Magnenat-Thalmann