Sciweavers

2347 search results - page 219 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
SPATIALCOGNITION
1998
Springer
14 years 15 days ago
Human Place Learning in a Computer Generated Arena
We describe the development of a computer-generated arena within which one can study human place learning by asking subjects to locate an invisible target. A series of studies demo...
L. Nadel, K. G. F. Thomas, H. E. Laurance, R. Skel...
DSN
2007
IEEE
14 years 7 days ago
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet ca...
Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Li...
SUTC
2010
IEEE
14 years 5 days ago
Data Caching in Ad Hoc Networks Using Game-Theoretic Analysis
— Extensive research has been performed to study selfish data caching in ad hoc networks using game-theoretic analysis. However, due to the caching problem’s theoretical root ...
Yutian Chen, Bin Tang
AICT
2006
IEEE
110views Communications» more  AICT 2006»
14 years 1 days ago
Design and Implementation of the NetTraveler Middleware System based on Web Services
We present NetTraveler a database middleware system for WANs that is designed to efficiently run queries over sites that are either mobile clients or enterprise servers. NetTravel...
Elliot A. Vargas-Figueroa, Manuel Rodriguez-Martin...
APWEB
2006
Springer
14 years 1 days ago
Classifying Web Data in Directory Structures
Web Directories have emerged as an alternative to the Search Engines for locating information on the Web. Typically, Web Directories rely on humans putting in significant time and ...
Sofia Stamou, Alexandros Ntoulas, Vlassis Krikos, ...