Sciweavers

822 search results - page 100 / 165
» Wireless course management system
Sort
View
IAW
2003
IEEE
14 years 3 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
PERCOM
2007
ACM
14 years 9 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
ISCC
2006
IEEE
14 years 4 months ago
Evaluating Filtering Strategies for Decentralized Handover Prediction in the Wireless Internet
The rapid diffusion of heterogeneous forms of wireless connectivity is pushing the tremendous growth of the commercial interest in mobile services, i.e., distributed applications ...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
WWIC
2004
Springer
133views Communications» more  WWIC 2004»
14 years 3 months ago
Design of Energy Efficient Wireless Networks Using Dynamic Data Type Refinement Methodology
Abstract. This paper presents a new perspective to the design of wireless networks using the proposed dynamic data type refinement methodology. In the forthcoming years, new portab...
Stylianos Mamagkakis, Alexandros Mpartzas, Georgio...
WETICE
2002
IEEE
14 years 2 months ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...