Sciweavers

215 search results - page 43 / 43
» A Mobile Ambients-Based Approach for Network Attack Modellin...
Sort
View
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
13 years 10 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
TCOM
2008
126views more  TCOM 2008»
13 years 4 months ago
Distributed measurements for estimating and updating cellular system performance
We investigate the use of distributed measurements for estimating and updating the performance of a cellular system. Specifically, we discuss the number and placement of sensors in...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
TMC
2010
158views more  TMC 2010»
13 years 3 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
ISCC
2006
IEEE
190views Communications» more  ISCC 2006»
13 years 10 months ago
Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio M...
COSIT
2001
Springer
142views GIS» more  COSIT 2001»
13 years 9 months ago
The Utility of Global Representations in a Cognitive Map
In this paper we propose the use of small global memory for a viewer’s immediate surroundings to assist in recognising places that have been visited previously. We call this glob...
Margaret E. Jefferies, Wai K. Yeap