Sciweavers

644 search results - page 114 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
SOFSEM
1998
Springer
15 years 4 months ago
Distributed Systems Technology for Electronic Commerce Applications
Abstract. Based on the specific characteristics of electronic commerce (ECommerce) requirements for an adequate system support, this contribution gives an overview of the respectiv...
Winfried Lamersdorf, Michael Merz, M. Tuan Tu
AGENTCL
2003
Springer
15 years 5 months ago
Intra-role Coordination Using Group Communication: A Preliminary Report
We propose group communication for agent coordination within “active rooms” and other pervasive computing scenarios featuring strict real-time requirements, inherently unrelia...
Paolo Busetta, Mattia Merzi, Silvia Rossi, Fran&cc...
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
15 years 25 days ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
110
Voted
VTC
2010
IEEE
185views Communications» more  VTC 2010»
14 years 9 months ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo
ICDCSW
2003
IEEE
15 years 5 months ago
Service Discovery and Name Resolution Architectures for On-Demand MANETs
Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). In this paper, we propose a mechanism for...
Paal Engelstad, Yan Zheng, Tore E. Jønvik, ...