Sciweavers

1440 search results - page 258 / 288
» Mobility Model for Tactical Networks
Sort
View
RE
2002
Springer
13 years 8 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
SECON
2010
IEEE
13 years 6 months ago
Disruption-Tolerant Spatial Dissemination
Abstract-- Spatial dissemination is a specific form of information dissemination that enables mobile users to send information to other mobile users who are or will appear at a spe...
Bo Xing, Sharad Mehrotra, Nalini Venkatasubramania...
IJWMC
2010
103views more  IJWMC 2010»
13 years 6 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
JCIT
2010
185views more  JCIT 2010»
13 years 3 months ago
GPS/TDOA Hybrid Location Algorithm Based on Federal Kalman Filter
Generally, accuracy of GPS(Global Positioning System) is higher than that of cellular network. But in tall building urban area or indoor, relatively weak GPS signal makes the posi...
Cui-Xia Li, Wei-Ming Liu, Zi-Nan Fu
JDCTA
2010
125views more  JDCTA 2010»
13 years 3 months ago
User Evaluation of a Community-centric Music Voting Service
In this paper, we present the user evaluation results of a Community-centric Music Voting service that relies on a DHT-based P2P network. For each user community, an independent D...
Timo Koskela, Janne Julkunen, Otso Kassinen, Mika ...