Sciweavers

2159 search results - page 384 / 432
» C-K design theory for information systems research
Sort
View
MOBICOM
2004
ACM
15 years 7 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
MOBICOM
2004
ACM
15 years 7 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
BMCBI
2008
83views more  BMCBI 2008»
15 years 2 months ago
Terminologies for text-mining; an experiment in the lipoprotein metabolism domain
Background: The engineering of ontologies, especially with a view to a text-mining use, is still a new research field. There does not yet exist a well-defined theory and technolog...
Dimitra Alexopoulou, Thomas Wächter, Laura Pi...
IWCMC
2006
ACM
15 years 7 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
IUI
2005
ACM
15 years 7 months ago
Interfaces for networked media exploration and collaborative annotation
In this paper, we present our efforts towards creating interfaces for networked media exploration and collaborative annotation. The problem is important since online social networ...
Preetha Appan, Bageshree Shevade, Hari Sundaram, D...