Sciweavers

2025 search results - page 316 / 405
» On the Utility of Inference Mechanisms
Sort
View
CG
1999
Springer
13 years 7 months ago
There is more to context than location
Context is a key issue in interaction between human and computer, describing the surrounding facts that add meaning. In mobile computing research published the parameter location ...
Albrecht Schmidt, Michael Beigl, Hans-Werner Gelle...
TKDE
2002
67views more  TKDE 2002»
13 years 7 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
TROB
2002
75views more  TROB 2002»
13 years 7 months ago
Sold!: auction methods for multirobot coordination
Abstract--The key to utilizing the potential of multirobot systems is cooperation. How can we achieve cooperation in systems composed of failure-prone autonomous robots operating i...
Brian P. Gerkey, Maja J. Mataric
IEEECIT
2010
IEEE
13 years 6 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
JNSM
2008
104views more  JNSM 2008»
13 years 6 months ago
Call Forwarding-Based Active Probing for POTS Fault Isolation
To ensure high availability of telephone services, there is considerable interest in network management activities to develop competent fault management mechanisms. In this paper w...
Chi-Shih Chao, Maitreya Natu, Adarshpal S. Sethi