Sciweavers

MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
15 years 6 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
98
Voted
MUE
2008
IEEE
177views Multimedia» more  MUE 2008»
15 years 6 months ago
Abnormal Gait Detection Using Discrete Fourier Transform
Detection of gait characteristics has found considerable interest in field of biomechanics and rehabilitation sciences. In this paper an approach for abnormal gait detection emplo...
Ahmed Mostayed, Mohammad Mynuddin Gani Mazumder, S...
99
Voted
MUE
2008
IEEE
173views Multimedia» more  MUE 2008»
15 years 6 months ago
Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing
In this paper we propose Rank-Based Broadcast (RBB) algorithm using High Order Markov Chain (HOMC) with weight values in mobile p2p ad-hoc networks (MOPNET) for ubiquitous. RBB us...
Do-Hoon Kim, Myoung Rak Lee, Longzhe Han, Hoh Pete...
MUE
2008
IEEE
161views Multimedia» more  MUE 2008»
15 years 6 months ago
A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...
100
Voted
MUE
2008
IEEE
144views Multimedia» more  MUE 2008»
15 years 6 months ago
Toward a Message-Oriented Application Model and its Middleware Support in Ubiquitous Environments
Context-awareness has become a distinguishing feature of Ubiquitous systems. Contrary to desktop and web applications, Ubiquitous applications gather environmental context and pro...
Chun-Feng Liao, Ya-Wen Jong, Li-Chen Fu
Multimedia
Top of PageReset Settings