Sciweavers

3483 search results - page 666 / 697
» Forward
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
14 years 9 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
CORR
2007
Springer
202views Education» more  CORR 2007»
14 years 9 months ago
Designing a Virtual Manikin Animation Framework Aimed at Virtual Prototyping
: In the industry, numerous commercial packages provide tools to introduce, and analyse human behaviour in the product's environment (for maintenance, ergonomics...), thanks t...
Antoine Rennuit, Alain Micaelli, Claude Andriot, F...
CORR
2007
Springer
124views Education» more  CORR 2007»
14 years 9 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
JAIR
2006
179views more  JAIR 2006»
14 years 9 months ago
The Fast Downward Planning System
Fast Downward is a classical planning system based on heuristic search. It can deal with general deterministic planning problems encoded in the propositional fragment of PDDL2.2, ...
Malte Helmert
JNW
2008
71views more  JNW 2008»
14 years 9 months ago
Enhancement of Delivery of Warning Messages for Mobile Networks
Vehicle-to-vehicle (V2V) communication systems have been studied extensively in recent years by transportation experts worldwide. Such systems enable the transmission of warning me...
Chia-Sheng Tsai, Wun-Kai Du