Sciweavers

ICSNC
2006
IEEE
14 years 6 months ago
Application Development in Vision-Enabled Wireless Sensor Networks
—Wireless networks in combination with image sensors open up a multitude of previously unthinkable sensing applications. Capable tools and testbeds for these wireless image senso...
Stephan Hengstler, Hamid K. Aghajan
ICSNC
2006
IEEE
14 years 6 months ago
Middleware - An Effort towards Making Mobile Applications Platform Independent
We propose a middleware architecture for GSM mobile phones that makes applications for mobile phones platform independent to a large extent as well as the applications made using ...
Neeraj Gupta, Vishal Srivastav, M. P. S. Bhatia
ICSNC
2006
IEEE
14 years 6 months ago
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol
Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kub...
ICSNC
2006
IEEE
14 years 6 months ago
Privacy-Invasive Software and Preventive Mechanisms
Computers are increasingly more integrated into peoples’ daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometime...
Martin Boldt, Bengt Carlsson
ICSNC
2006
IEEE
14 years 6 months ago
Security Issues in Wireless Sensor Networks
– Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive documen...
Tanveer Zia, Albert Y. Zomaya
ICSNC
2006
IEEE
14 years 6 months ago
System capacity in OFDMA-based WiMAX
— In this paper, we study the capacity of broadband wireless OFDMA-based WiMAX systems, in the presence of both constant-bit-rate streaming traffic as well as elastic one, under...
Chadi Tarhini, Tijani Chahed
ICSNC
2006
IEEE
14 years 6 months ago
XHTML encoding and compression
The wireless markup language (WML), used in WAP, is based on XML and therefore is quite verbose. Mobile devices do not typically have the processing power or memory to process such...
Sathiamoorthy Manoharan