Sciweavers

1610 search results - page 243 / 322
» A Transaction Model for Mobile Computing
Sort
View
103
Voted
CHI
2005
ACM
16 years 3 months ago
Parallel worlds: immersion in location-based experiences
This paper analyses the stages and circumstances for immersion based on quantitative and qualitative feedback from 563 people who took part in a three week long public trial of a ...
Ben J. C. Clayton, Erik Geelhoed, Josephine Reid, ...
117
Voted
CSCWD
2008
Springer
15 years 4 months ago
Authorization approaches for advanced permission-role assignments
Role-based access control (RBAC) has been proven to be a flexible and useful access control model for information sharing in distributed collaborative environments. Permission-rol...
Hua Wang, Jianming Yong, Jiuyong Li, Min Peng
115
Voted
CONCUR
2010
Springer
15 years 3 months ago
Parameterized Verification of Ad Hoc Networks
We study decision problems for parameterized verification of a formal model of Ad Hoc Networks with selective broadcast and spontaneous movement. The communication topology of a ne...
Giorgio Delzanno, Arnaud Sangnier, Gianluigi Zavat...
128
Voted
SAC
2010
ACM
15 years 9 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...
226
Voted
TDSC
2011
14 years 9 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...