Sciweavers

AINA
2009
IEEE
14 years 4 months ago
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol
—Although several analytical models have been proposed for wireless sensor networks (WSNs) with different capabilities, very few of them consider the effect of general service di...
Mohammad Baharloo, Reza Hajisheykhi, Mohammad Arjo...
AINA
2009
IEEE
14 years 4 months ago
Preference Ordering in Agenda Based Multi-issue Negotiation for Service Level Agreement
—This paper discusses multi-issue negotiation between agents such as providers and consumers in a group decision making environment. The outcome of such encounters depends on two...
Fahmida Abedin, Kuo-Ming Chao, Nick Godwin, Hisbel...
AINA
2009
IEEE
14 years 4 months ago
Differences and Commonalities of Service-Oriented Device Architectures, Wireless Sensor Networks and Networks-on-Chip
Device centric Service-oriented Architectures have shown to be applicable in the automation industry for interconnecting manufacturing devices and enterprise systems, thus, establ...
Guido Moritz, Claas Cornelius, Frank Golatowski, D...
AINA
2009
IEEE
14 years 4 months ago
Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks
Nowadays more and more devices of daily life are connected to each other and are integrated into massively distributed networks of embedded devices. These devices range from consu...
Christian Buckl, Stephan Sommer, Andreas Scholz, A...
AINA
2009
IEEE
14 years 4 months ago
Location-Transparent Integration of Distributed OSGi Frameworks and Web Services
The OSGi Alliance defines an open, modular, and scalable service delivery platform. The DPWS specification standardizes the process of consuming and exposing Web Services in a l...
Christoph Fiehe, Anna Litvina, Ingo Lück, Oli...
AINA
2009
IEEE
14 years 4 months ago
Do Metrics Make Recommender Algorithms?
Recommender systems are used to suggest customized products to users. Most recommender algorithms create collaborative models by taking advantage of web user profiles. In the las...
Elica Campochiaro, Riccardo Casatta, Paolo Cremone...
AINA
2009
IEEE
14 years 4 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
AINA
2009
IEEE
14 years 4 months ago
Development of Immersive Virtual Driving Environment Using OpenCABIN Library
— To investigate how aged drivers can drive more safely, we are developing an immersive virtual driving environment. It consists of precise force feedback steering system device,...
Yoshisuke Tateyama, Tetsuro Ogi, Hidekazu Nishimur...
GCC
2003
Springer
14 years 4 months ago
Network Behavior Analysis Based on a Computer Network Model
This paper applies a new traffic model, iterated function systems (IFS) for network traffic modelling, to explore computer network behaviour and analyse network performance. IFS mo...
Weili Han, Shuai Dianxun, Yujun Liu