Sciweavers

1370 search results - page 200 / 274
» On the Consistent Observation of Active Systems
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
14 years 3 months ago
An Experiment on the Effects of Interruptions on Individual Work Trajectories and Performance in Critical Environments
Interruptions are a central characteristic of work in critical environments such as hospitals, airlines, and security agencies. Often, interruptions occur as notifications of some...
Suzanne P. Weisband, Kelly J. Fadel, Elisa Mattare...
IPSN
2007
Springer
14 years 3 months ago
Power scheduling for wireless sensor and actuator networks
We previously presented a model for some wireless sensor and actuator network (WSAN) applications based on the vector space tools of frame theory. In this WSAN model there is a we...
Christopher J. Rozell, Don H. Johnson
ICDCS
2006
IEEE
14 years 2 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
CSCW
2006
ACM
14 years 2 months ago
Moving office: inhabiting a dynamic building
Mixed Reality Architecture (MRA) supports distributed teams in their everyday work activities by linking multiple physical spaces across a shared three-dimensional virtual world. ...
Holger Schnädelbach, Alan Penn, Phil Steadman...