Sciweavers

ICITA
2005
IEEE
14 years 5 months ago
Performance Tuning in the MacauMap Mobile Map Application
With the increasing popularity of mobile computing platforms such as personal digital assistants (PDAs) and smart mobile phones, applications originally designed for higherperform...
Robert P. Biuk-Aghai
ICITA
2005
IEEE
14 years 5 months ago
A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would I
Supporting a rich array of information sources is a key element to making highly mobile computing devices usable by the wider community. It is our belief that there will not be on...
Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne...
ICITA
2005
IEEE
14 years 5 months ago
Managing the Co-Existing Network of IPv6 and IPv4 under Various Transition Mechanisms
Even though IPv6 has been developed for more than a decade, IPv4 is still the most commonly adopted network protocol. However, the significant changes in the new version may cause...
I-Ping Hsieh, Shang-Juh Kao
ICITA
2005
IEEE
14 years 5 months ago
Some Remarks on Security of Receipt-Free E-auction
Recently, a receipt-free scheme is rising for a secure eauction. The goal of a receipt-free scheme in an eauction is to prevent a bid-rigging. If the bid-rigging happens in the e-...
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
ICITA
2005
IEEE
14 years 5 months ago
A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the...
Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien...
ICITA
2005
IEEE
14 years 5 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang
ICITA
2005
IEEE
14 years 5 months ago
Partition-Based Parallel PageRank Algorithm
A re-ranking technique,called “PageRank brings a successful story behind the search engine. Many studies focus on finding an way to compute the PageRank scores of a large web gr...
Arnon Rungsawang, Bundit Manaskasemsak
ICITA
2005
IEEE
14 years 5 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
ICITA
2005
IEEE
14 years 5 months ago
p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc Networks
In this paper, we propose an efficient power saving protocol for multi-hop mobile ad hoc networks, called p-MANET. Our design is expected as a new foundation MAC layer power savin...
Chiung-Ying Wang, Chi-Jen Wu, Guan-Nan Chen, Ren-H...
ICITA
2005
IEEE
14 years 5 months ago
A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate Paths
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...