Sciweavers

589 search results - page 104 / 118
» Evaluating mobile phones as risk information providers
Sort
View
WWIC
2007
Springer
247views Communications» more  WWIC 2007»
14 years 1 months ago
Reliable Geographical Multicast Routing in Vehicular Ad-Hoc Networks
Vehicular ad-hoc networks (VANETs) offer a large number of new potential applications without relying on significant infrastructure. Many of these applications benefit from multi-h...
Maria Kihl, Mihail L. Sichitiu, Ted Ekeroth, Micha...
CSREASAM
2006
13 years 9 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
CCR
2008
79views more  CCR 2008»
13 years 7 months ago
CRAWDAD workshop 2007
Wireless network researchers are hungry for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, the Community Resource f...
Jihwang Yeo, Tristan Henderson, David Kotz
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 11 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
PERSUASIVE
2007
Springer
14 years 1 months ago
Toward a Systematic Understanding of Suggestion Tactics in Persuasive Technologies
The unique capabilities of mobile, context-aware, networked devices make them an interesting platform for applying suggestion in persuasive technologies. Because these devices are ...
Adrienne H. Andrew, Gaetano Borriello, James Fogar...