Sciweavers

22 search results - page 4 / 5
» mue 2008
Sort
View
MUE
2008
IEEE
173views Multimedia» more  MUE 2008»
14 years 5 months ago
Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing
In this paper we propose Rank-Based Broadcast (RBB) algorithm using High Order Markov Chain (HOMC) with weight values in mobile p2p ad-hoc networks (MOPNET) for ubiquitous. RBB us...
Do-Hoon Kim, Myoung Rak Lee, Longzhe Han, Hoh Pete...
MUE
2008
IEEE
177views Multimedia» more  MUE 2008»
14 years 5 months ago
Abnormal Gait Detection Using Discrete Fourier Transform
Detection of gait characteristics has found considerable interest in field of biomechanics and rehabilitation sciences. In this paper an approach for abnormal gait detection emplo...
Ahmed Mostayed, Mohammad Mynuddin Gani Mazumder, S...
MUE
2008
IEEE
161views Multimedia» more  MUE 2008»
14 years 5 months ago
A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...
MUE
2008
IEEE
137views Multimedia» more  MUE 2008»
14 years 5 months ago
Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems
The route guidance system, which provides driving advice based on traffic information about an origin and a destination, has become very popular along with the advancement of hand...
Chu-Hsing Lin, Jui-Ling Yu, Jung-Chun Liu, Chia-Je...
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
14 years 5 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...