Sciweavers

277 search results - page 6 / 56
» Towards Semantic Modeling of Network Physical Devices
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
ICC
2007
IEEE
193views Communications» more  ICC 2007»
14 years 1 months ago
A Semantic Context Model for Location-Based Cooperative Mobile Computing
—This paper addresses context issues in pervasive mobile computing and presents a semantic context model to support location based cooperative mobile applications. In this paper,...
Bin Hu, Philip Moore, Hsiai-Hwa Chen
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
UIC
2007
Springer
14 years 1 months ago
Location-Based Recommendation System Using Bayesian User's Preference Model in Mobile Devices
As wireless communication advances, research on location-based services using mobile devices has attracted interest, which provides information and services related to user’s phy...
Moon-Hee Park, Jin-Hyuk Hong, Sung-Bae Cho
APSEC
2004
IEEE
13 years 11 months ago
Top-Down Approach Toward Building Ubiquitous Sensor Network Applications
Tiny networked sensor devices will be disseminated over our physical life space, and take a significant role in realizing a ubiquitous computing environment. As sensor network tec...
Yoshihiro Kawahara, Nao Kawanishi, Hiroyuki Morika...