Sciweavers

204 search results - page 31 / 41
» Challenges in Technostress Research: Guiding Future Work
Sort
View
ADHOC
2006
87views more  ADHOC 2006»
14 years 10 months ago
Medium Access Control protocols for ad hoc wireless networks: A survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols a...
Sunil Kumar, Vineet S. Raghavan, Jing Deng
89
Voted
JNW
2008
126views more  JNW 2008»
14 years 10 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
91
Voted
MOBIHOC
2008
ACM
15 years 10 months ago
Routing in a cyclic mobispace
A key challenge of routing in delay tolerant networks (DTNs) is to find routes that have high delivery rates and low endto-end delays. When oracles are not available for future co...
Cong Liu, Jie Wu
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 5 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
MIDDLEWARE
2007
Springer
15 years 4 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka