Sciweavers

1209 search results - page 144 / 242
» A Mobile Object Workbench
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 9 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
AISS
2010
97views more  AISS 2010»
13 years 6 months ago
The Naming Service of Multi-Agent for the Sensor Network Applications
The node selection for the migration of a mobile agent depends on the content of the referenced metadata in the naming space. The reliability of the migrated information is determ...
Yonsik Lee, Minseok Jang
ICCS
2003
Springer
14 years 2 months ago
Trajectory Mapping for Landmine Detection Training
A head-mounted camera is a useful tool for studying the usability of mobile devices in the field. In this paper, a computerized visualization method is presented. It includes the t...
Yang Cai 0002
MMS
2010
13 years 7 months ago
Ubimedia based on readable and writable memory tags
Ubimedia is a concept where media files are embedded in everyday objects and the environment. We propose an approach where the user can read and write these files with his/her pe...
Eija Kaasinen, Marketta Niemelä, Timo Tuomist...
PEWASUN
2004
ACM
14 years 2 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...