Sciweavers

JNCA
2010
85views more  JNCA 2010»
13 years 6 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
JNCA
2010
41views more  JNCA 2010»
13 years 6 months ago
Combining features for distorted fingerprint matching
Kai Cao, Xin Yang, Xunqiang Tao, Peng Li, Yali Zan...
JNCA
2010
55views more  JNCA 2010»
13 years 6 months ago
An authentication scheme for locating compromised sensor nodes in WSNs
Youtao Zhang, Jun Yang 0002, Weijia Li, Linzhang W...
JNCA
2010
244views more  JNCA 2010»
13 years 6 months ago
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang ...
JNCA
2010
94views more  JNCA 2010»
13 years 10 months ago
Distributed autonomic management: An approach and experiment towards managing service-centric networks
This paper describes a novel approach for managing service-centric communications networks called distributed autonomic management (DAM). Current approaches to network management ...
Pradeep Ray, Nandan Parameswaran, Lundy Lewis
JNCA
2010
106views more  JNCA 2010»
13 years 10 months ago
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
Today’s web applications are more collaborative and are using the standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware...
Praveen Madiraju, Srilaxmi Malladi, Janaka Balasoo...
JNCA
2010
67views more  JNCA 2010»
13 years 10 months ago
Adaptation of RSS feeds based on the user profile and on the end device
Christos Bouras, Vassilis Poulopoulos, Vassilis Ts...
JNCA
2010
49views more  JNCA 2010»
13 years 10 months ago
QoS multicast tree construction in IP/DWDM optical internet by bio-inspired algorithms
Hui Cheng, Xingwei Wang, Shengxiang Yang, Min Huan...