Sciweavers

ICSNC
2007
IEEE
14 years 6 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
ICSNC
2007
IEEE
14 years 6 months ago
Self-Similarity Analysis Applied to 2D Breast Cancer Imaging
This article presents a new trend in computerized medical image analysis of breast cancer features, existing in mammograms (grey scale 2D images), based on recent approaches of th...
Filipe Soares, Pawel Andruszkiewic, Mário M...
ICSNC
2007
IEEE
14 years 6 months ago
Advanced Querying Architecture for DICOM Systems
Radiology, which deals with medical images for diagnosis purposes, has seen a lot of improvements during the last decades thanks to information technology. The migration from stud...
Rui Agostinho, Manuela Pereira, Mário M. Fr...
ICSNC
2007
IEEE
14 years 6 months ago
Efficient Transformation Scheme for Indexing Continuous Queries on RFID Streaming Data
RFID data are usually regarded as streaming data that are huge and change frequently because they are gathered continuously by numerous readers. RFID middleware filters the data a...
Jaekwan Park, Bonghee Hong, ChaeHoon Ban
ICSNC
2007
IEEE
14 years 6 months ago
Medical Applications of Wireless Networks
Shobha G., Ranjana R. Chittal, Kamod Kumar
ICSNC
2007
IEEE
14 years 6 months ago
Movement Prediction Using Bayesian Learning for Neural Networks
Nowadays, path prediction is being extensively examined for use in the context of mobile and wireless computing towards more efficient network resource management schemes. Path pr...
Sherif Akoush, Ahmed Sameh
ICSNC
2007
IEEE
14 years 6 months ago
Programming Approaches and Challenges for Wireless Sensor Networks
Wireless sensor networks (WSNs) constitute a new pervasive and ubiquitous technology. They have been successfully used in various application areas and in future computing environ...
Bartolomé Rubio, Manuel Díaz, Jos&ea...
ICSNC
2007
IEEE
14 years 6 months ago
Automated QoS policy adaptation for heterogeneous access network environments
To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated con...
Pedro A. Aranda-Gutiérrez, Ilka Miloucheva
ICSNC
2007
IEEE
14 years 6 months ago
IP Local Node Protection
Hui-Kai Su, Cheng-Shong Wu, Yuan-Sun Chu