Sciweavers

561 search results - page 71 / 113
» Disconnected Operations in Mobile Environments
Sort
View
IEEEARES
2008
IEEE
15 years 10 months ago
An Ontological Approach to Secure MANET Management
Mobile Ad hoc Networks (MANETs) rely on dynamic configuration decisions to efficiently operate in a rapidly changing environment of limited resources. The ability of a MANET to ma...
Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine
130
Voted
HOTOS
2007
IEEE
15 years 7 months ago
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era
Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 4 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
153
Voted
ICRA
1993
IEEE
184views Robotics» more  ICRA 1993»
15 years 7 months ago
Vision-Guided Exploration: A Step Toward General Motion Planning in Three Dimensions
We present an approach for solving the path planning problem for a mobile robot operating in an unknown, three dimensional environment containing obstacles of arbitrary shape. The...
Kiriakos N. Kutulakos, Vladimir J. Lumelsky, Charl...
WWW
2007
ACM
16 years 4 months ago
A mobile application framework for the geospatial web
In this paper we present an application framework that leverages geospatial content on the World Wide Web by enabling innovative modes of interaction and novel types of user inter...
Peter Fröhlich, Rainer Simon