Sciweavers

1320 search results - page 126 / 264
» Constraint Based Network Adaptation for Ubiquitous Applicati...
Sort
View
IPPS
2007
IEEE
15 years 7 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
117
Voted
AICT
2005
IEEE
167views Communications» more  AICT 2005»
15 years 6 months ago
Passive Cluster Based Clock Synchronization in Sensor Network
Clock synchronization has paid a great magnitude of attention in the distributed systems. Sensor networks differ from traditional distributed system in many ways. One of the drama...
Md. Mamun-Or-Rashid, Choong Seon Hong, Chi Hyung I...
105
Voted
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 28 days ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin
104
Voted
EEE
2005
IEEE
15 years 6 months ago
A Broker-Based Framework for QoS-Aware Web Service Composition
Web services are modular web applications that can be independently deployed and invoked by other software or services on the web. This offers enterprises the capability to integr...
Tao Yu, Kwei-Jay Lin
157
Voted
ICC
2007
IEEE
193views Communications» more  ICC 2007»
15 years 7 months ago
A Semantic Context Model for Location-Based Cooperative Mobile Computing
—This paper addresses context issues in pervasive mobile computing and presents a semantic context model to support location based cooperative mobile applications. In this paper,...
Bin Hu, Philip Moore, Hsiai-Hwa Chen