Sciweavers

461 search results - page 9 / 93
» ParaStation User Level Communication
Sort
View
IPPS
2007
IEEE
14 years 1 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
14 years 17 days ago
Growth and Propagation of Disturbances in a Communication Network Model
In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Ana...
David E. Newman, Nathaniel D. Sizemore, Vickie E. ...
MDM
2007
Springer
111views Communications» more  MDM 2007»
14 years 1 months ago
Situation Inference for Mobile Users: A Rule Based Approach
Mobile phones are being increasingly equipped with sensors that ease retrieval of context information about a user. Context data can be aggregated with information centrally avail...
Laurent-Walter Goix, Massimo Valla, Laura Cerami, ...
ICDS
2009
IEEE
14 years 2 months ago
Security and User Guidelines for the Design of the Future Networked Systems
—Emergence of new networking technologies and paradigms provides users multitude of ways to communicate with each others and exchange information irrespective of time and place. ...
Seppo Heikkinen, Sari Kinnari, Kari Heikkinen
INFOCOM
2009
IEEE
14 years 2 months ago
Tuning Skype's Redundancy Control Algorithm for User Satisfaction
—Determining how to transport delay-sensitive voice data has long been a problem in multimedia networking. The difficulty arises because voice and best-effort data are different...
Te-Yuan Huang, Kuan-Ta Chen, Polly Huang