Sciweavers

CIIT
2007
133views Communications» more  CIIT 2007»
13 years 10 months ago
A cross-platform solution for bibliographic record manipulation in digital libraries
We investigate the problem of a collaborative digital library collection that allows librarians and non-librarians alike to share information on specific topics through MARC reco...
Wendy Osborn, D. Kaur, K. Crewdson, I. Dew
CIIT
2007
161views Communications» more  CIIT 2007»
13 years 10 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
CMS
2010
138views Communications» more  CMS 2010»
13 years 10 months ago
Tor HTTP Usage and Information Leakage
This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how...
Marcus Huber, Martin Mulazzani, Edgar Weippl
FGCN
2008
IEEE
150views Communications» more  FGCN 2008»
13 years 10 months ago
A Prioritized Service Protocol for Vehicular Communication
Vehicular network became one of the most active and emerging fields of research during last decade. Its use in diversified applications (for example safe driving, congestion avoid...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...
FGCN
2008
IEEE
116views Communications» more  FGCN 2008»
13 years 10 months ago
A Document Based Framework for Smart Object Systems
Fahim Kawsar, Tatsuo Nakajima, Jong Hyuk Park, You...
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
13 years 10 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik
FGCN
2008
IEEE
155views Communications» more  FGCN 2008»
13 years 10 months ago
Modeling the Marginal Distribution of Gene Expression with Mixture Models
We report the results of fitting mixture models to the distribution of expression values for individual genes over a broad range of normal tissues, which we call the marginal expr...
Edward Wijaya, Hajime Harada, Paul Horton
ICCCN
2007
IEEE
13 years 10 months ago
Greedy Face Routing with Face ID Support in Wireless Networks
—Geographic face routing provides an attractive way for packet delivery in wireless networks due to its high reliability and low overhead. A good face routing protocol should pro...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
ICC
2007
IEEE
186views Communications» more  ICC 2007»
13 years 10 months ago
On Channel Coding Selection in Time-Slotted ALOHA Packetized Multiple-Access Systems Over Rayleigh Fading Channels
— In this paper, we consider the time-slotted ALOHA packetized multiple-access system where the transmission channels obey i.i.d (independent identically distributed) Rayleigh fa...
Chen Wei, Pingyi Fan, Khaled Ben Letaief