Sciweavers

146 search results - page 27 / 30
» Platys: From Position to Place-Oriented Mobile Computing
Sort
View
IWIA
2005
IEEE
14 years 1 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
MSWIM
2009
ACM
14 years 2 months ago
A performance evaluation framework for fair solutions in ad hoc networks
Fairness in multihop ad hoc networks has received considerable attention in the literature. Many schemes have been proposed, which attempt to compute the “optimal” bit rates o...
Manos Dramitinos, Rémi Vannier, Isabelle Gu...
ICESS
2005
Springer
14 years 29 days ago
Localized Energy-Aware Broadcast Protocol for Wireless Networks with Directional Antennas
Abstract. We consider broadcast protocols in wireless networks that have limited energy and computation resources. The well-known algorithm, DBIP (Directional Broadcast Incremental...
Hui Xu, Manwoo Jeon, Lei Shu, Xiaoling Wu, Jinsung...
ICDE
2002
IEEE
149views Database» more  ICDE 2002»
14 years 8 months ago
Indexing Spatio-Temporal Data Warehouses
Spatio-temporal databases store information about the positions of individual objects over time. In many applications however, such as traffic supervision or mobile communication ...
Dimitris Papadias, Yufei Tao, Panos Kalnis, Jun Zh...
EWSN
2007
Springer
14 years 7 months ago
Decentralized Scattering of Wake-Up Times in Wireless Sensor Networks
Duty-cycling in wireless sensor networks (WSNs) has both beneficial effects on network lifetime and negative effects on application performance due to the inability of a sensor to ...
Alessandro Giusti, Amy L. Murphy, Gian Pietro Picc...