Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
This paper addresses the segmentation from an image of entities that have the form of a ‘network’, i.e. the region in the image corresponding to the entity is composed of bran...
This paper proposes a multiagent based virtual community as a new means to support pervasive computing services. We give a conceptual definition of the concept of Place-Based Virt...
Tuan Nguyen, Seng Wai Loke, Torab Torabi, Hongen L...
This paper introduces a new class of interactive interfaces that can be moved around to appear on ordinary objects and surfaces anywhere in a space. By dynamically adapting the fo...
Gopal Pingali, Claudio S. Pinhanez, Anthony Levas,...