Sciweavers

5446 search results - page 1043 / 1090
» Mobile computing
Sort
View
WIMOB
2008
IEEE
14 years 3 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
WIMOB
2008
IEEE
14 years 3 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao
WMCSA
2008
IEEE
14 years 3 months ago
HealthSense: classification of health-related sensor data through user-assisted machine learning
Remote patient monitoring generates much more data than healthcare professionals are able to manually interpret. Automated detection of events of interest is therefore critical so...
Erich P. Stuntebeck, John S. Davis II, Gregory D. ...
MOBICOM
2005
ACM
14 years 2 months ago
Characterizing the capacity region in multi-radio multi-channel wireless mesh networks
Next generation fixed wireless broadband networks are being increasingly deployed as mesh networks in order to provide and extend access to the internet. These networks are chara...
Murali S. Kodialam, Thyaga Nandagopal
STORAGESS
2005
ACM
14 years 2 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...
« Prev « First page 1043 / 1090 Last » Next »