Sciweavers

1270 search results - page 169 / 254
» IF Validation Environment Tutorial
Sort
View
PETRA
2009
ACM
15 years 8 months ago
Description and future trends of ICT solutions offered towards independent living: the case of LLM project
Due to the increasing elderly population, healthcare systems able to promote independent living are regarded as an emerging market. Despite the significant advances aiming to supp...
Christos A. Frantzidis, Panagiotis D. Bamidis
SIGCOMM
2009
ACM
15 years 8 months ago
A standalone content sharing application for spontaneous communities of mobile handhelds
This demo illustrates the benefits of BitHoc, a standalone protocol for content sharing among spontaneous communities of mobile handhelds using wireless multi-hop connections. Bi...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
SOUPS
2009
ACM
15 years 8 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
ACISICIS
2008
IEEE
15 years 8 months ago
Building a Service-Oriented Ontology for Wireless Sensor Networks
Wireless sensor networks (WSNs) provide various environment data in the real-world, and also WSNs´s middleware is able to offer field data in real-time by user queries. For mate...
Jeong-Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young K...
128
Voted
AINA
2008
IEEE
15 years 8 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...