Sciweavers

244 search results - page 38 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
SECON
2008
IEEE
14 years 1 months ago
Content Distribution in VANETs Using Network Coding: The Effect of Disk I/O and Processing O/H
Abstract—Besides safe navigation (e.g., warning of approaching vehicles), car to car communications will enable a host of new applications, ranging from office-on-the-wheel supp...
Seung-Hoon Lee, Uichin Lee, Kang-Won Lee, Mario Ge...
CASES
2006
ACM
14 years 1 months ago
A case study of multi-threading in the embedded space
The continuing miniaturization of technology coupled with wireless networks has made it feasible to physically embed sensor network systems into the environment. Sensor net proces...
Greg Hoover, Forrest Brewer, Timothy Sherwood
ADHOCNOW
2005
Springer
14 years 1 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
IPCV
2007
13 years 9 months ago
Tracking Multiple Sports Players for Mobile Display
- An architecture system and a method for tracking people are presented for sports applications. The system’s input is video data from static camera and the output is the real wo...
Andreas Aristidou, Paul Pangalos, Hamid Aghvami
IJIPT
2008
191views more  IJIPT 2008»
13 years 7 months ago
ARPM: Agent-based Routing Protocol for MANET
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
Helen Bakhsh, Manal Abdullah