Sciweavers

10044 search results - page 1899 / 2009
» Authentication in Wireless Networks
Sort
View
CSREAPSC
2006
15 years 6 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
DMIN
2006
122views Data Mining» more  DMIN 2006»
15 years 6 months ago
Cost-Sensitive Analysis in Multiple Time Series Prediction
- In this paper we propose a new methodology for Cost-Benefit analysis in a multiple time series prediction problem. The proposed model is evaluated in a real world application bas...
Chamila Walgampaya, Mehmed M. Kantardzic
ECEH
2006
162views Healthcare» more  ECEH 2006»
15 years 6 months ago
Mobile Health Care: Towards a Commercialization of Research Results
: During the last fours years a consortium of universities, hospitals and commercial companies has been working together for the development of innovative systems and services for ...
Dimitri Konstantas, Richard Bults, Aart van Halter...
MMNS
2004
81views Multimedia» more  MMNS 2004»
15 years 5 months ago
Providing Seamless Mobility with Competition based Soft Handover Management
As host mobility and radio interference in wireless networks cause packet losses and delays, it is difficult to develop useful mobile real-time media applications. This paper descr...
Johan Kristiansson, Peter Parnes
OPODIS
2004
15 years 5 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
« Prev « First page 1899 / 2009 Last » Next »