Sciweavers

972 search results - page 19 / 195
» Design and Protocol for Internet Accessible Mathematical Com...
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 8 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
SAC
2003
ACM
13 years 12 months ago
A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration
This paper presents flexible protocols for dynamic database design and reconfiguration, enabling mobile database to be designed in such a way that data location, replication and e...
Yanli Xia, Abdelsalam Helal
ANTSW
2008
Springer
13 years 8 months ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
ICCHP
2004
Springer
14 years 3 days ago
Neuropsychological Function for Accessibility of Computer Program for People with Mental Retardation
The extent to which people with mental retardation are benefit from the modern information technology is not well explored. A better understanding on ways that the existing human-c...
Alex W. W. Wong, Chetwyn C. H. Chan, Cecilia W. P....
WCNC
2008
IEEE
14 years 1 months ago
Senslets- Applets for the Sensor Internet
The Sensor Internet provides access to sensor services by connecting sensor nodes to the Internet infrastructure. To achieve this, current solutions rely on fixed access points or ...
Frank Siegemund, Muhammad Haroon, Junaid Ansari, P...