Sciweavers

2310 search results - page 424 / 462
» Managing System and Active-Content Integrity
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
13 years 7 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
CORR
2006
Springer
122views Education» more  CORR 2006»
13 years 7 months ago
Unification of multi-lingual scientific terminological resources using the ISO 16642 standard. The TermSciences initiative
The TermSciences initiative aims at building a multi-purpose and multi-lingual knowledge system from different source vocabularies produced by major French research institutions a...
Majid Khayari, Stéphane Schneider, Isabelle...
JCM
2006
144views more  JCM 2006»
13 years 7 months ago
Using Micro-Genetic Algorithms to Improve Localization in Wireless Sensor Networks
Wireless sensor networks are widely adopted in many location-sensitive applications including disaster management, environmental monitoring, military applications where the precise...
Vincent Tam, King-Yip Cheng, King-Shan Lui
JCP
2006
110views more  JCP 2006»
13 years 7 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
DSS
2007
124views more  DSS 2007»
13 years 7 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong