Sciweavers

675 search results - page 133 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
DATASCIENCE
2007
84views more  DATASCIENCE 2007»
13 years 7 months ago
Open Data for Global Science
The digital revolution has transformed the accumulation of properly curated public research data into an essential upstream resource whose value increases with use.1 The potential...
Paul F. Uhlir, Peter Schröder
CORR
2004
Springer
106views Education» more  CORR 2004»
13 years 7 months ago
Intelligent Systems: Architectures and Perspectives
: The integration of different learning and adaptation techniques to overcome individual limitations and to achieve synergetic effects through the hybridization or fusion of these ...
Ajith Abraham
AAAI
2010
13 years 6 months ago
A Trust Model for Supply Chain Management
hey generalize these factors to the abstract concepts of ability, integrity, and benevolence. This model does not use probabilistic decision theory. Other SCM trust factors have be...
Yasaman Haghpanah, Marie desJardins
TMC
2010
158views more  TMC 2010»
13 years 5 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
MOBIHOC
2006
ACM
14 years 7 months ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...