Sciweavers

1266 search results - page 98 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
MOBISYS
2009
ACM
16 years 5 months ago
Predictive methods for improved vehicular WiFi access
With the proliferation of WiFi technology, many WiFi networks are accessible from vehicles on the road making vehicular WiFi access realistic. However, several challenges exist: l...
Pralhad Deshpande, Anand Kashyap, Chul Sung, Samir...
PERCOM
2010
ACM
15 years 8 months ago
Indoor localization in multi-floor environments with reduced effort
Abstract—In pervasive computing, localizing a user in wireless indoor environments is an important yet challenging task. Among the state-of-art localization methods, fingerprint...
Hua-Yan Wang, Vincent Wenchen Zheng, Junhui Zhao, ...
AUSAI
2006
Springer
15 years 8 months ago
Modular Bayesian Networks for Inferring Landmarks on Mobile Daily Life
Abstract. Mobile devices get to handle much information thanks to the convergence of diverse functionalities. Their environment has great potential of supporting customized service...
Keum-Sung Hwang, Sung-Bae Cho
AINA
2008
IEEE
15 years 11 months ago
Dynamic Cache Invalidation Scheme in IR-Based Wireless Environments
Traditional cache invalidation schemes are not suitable to be employed in wireless environments due to the affections of mobility, energy consumption, and limited bandwidth. Cache ...
Yeim-Kuan Chang, Yi-Wei Ting, Tai-Hong Lin
MSN
2005
Springer
15 years 10 months ago
Handling Sensed Data in Hostile Environments
Systems that track sensed data trigger alerts based on the evaluation of some condition. In the presence of loss data a conservative condition may not generate a necessary alert an...
Oren Ben-Zwi, Shlomit S. Pinter