Sciweavers

3016 search results - page 545 / 604
» Disappearing mobile devices
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
AINA
2004
IEEE
13 years 11 months ago
MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks
This paper presents a novel effective scheme of configuring Wireless Personal Area Networks (WPANs), called Master-driven Connection Control (MaCC). WPANs are based on a new wirel...
Makoto Takizawa, Hiroto Aida, Masato Saito, Yoshit...
AICT
2006
IEEE
123views Communications» more  AICT 2006»
13 years 11 months ago
Issues related to Development of Wireless Peer-to-Peer Games in J2ME
This paper describes and discusses challenges related to development of peer-to-peer games in J2ME using the available Bluetooth API (JSR82). By using Bluetooth on wireless device...
Alf Inge Wang, Michael Sars Norum, Carl-Henrik Wol...
AUIC
2004
IEEE
13 years 11 months ago
Wearable Microphone Array as User Interface
We are at present enabled with machine-empowered technologies. The future is certainly looking towards human-empowered technologies, which should enable mobile user with natural w...
Yong Xu, Mingjiang Yang, Yanxin Yan, Jianfeng Chen
AUIC
2004
IEEE
13 years 11 months ago
Visualization of Travel Itinerary Information on PDAs
Conventional travel itineraries list travel related information, such as flights and hotel bookings, in a chronological order of date and time. As such the only observable relatio...
Masood Masoodian, Daryl Budd