Sciweavers

1270 search results - page 202 / 254
» IF Validation Environment Tutorial
Sort
View
JSAC
2006
127views more  JSAC 2006»
15 years 1 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
IJCIM
2007
122views more  IJCIM 2007»
15 years 1 months ago
Implementation approach of ERP with mass customization
: This paper analyzes the shortage of traditional ERP systems in the current dynamic and competitive enterprises environment. The new generation ERP system needs to be frequently c...
Y. Zhao, Y. S. Fan
ISJGP
2007
146views more  ISJGP 2007»
15 years 1 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
TITB
2008
108views more  TITB 2008»
15 years 1 months ago
Gait Analysis Using a Shoe-Integrated Wireless Sensor System
Abstract--We describe a wireless wearable system that was developed to provide quantitative gait analysis outside the confines of the traditional motion laboratory. The sensor suit...
Stacy J. Morris Bamberg, Ari Y. Benbasat, Donna M....
CG
2005
Springer
15 years 1 months ago
Enhancing collaboration in virtual reality applications
We derive a complete component framework for transforming standalone VR applications into full-fledged multithreaded Collaborative Virtual Reality Environments (CVREs), after char...
Víctor Theoktisto, Marta Fairén Gonz...