Sciweavers

2572 search results - page 474 / 515
» Identification in Ad Hoc Networks
Sort
View
NBIS
2009
Springer
15 years 8 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
RAID
2009
Springer
15 years 8 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 8 months ago
Complexity and Error Propagation of Localization Using Interferometric Ranging
— An interferometric ranging technique has been recently proposed as a possible way to localize ad hoc and sensor networks. Compared to the more common techniques such as receive...
Rui Huang, Gergely V. Záruba, Manfred Huber
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
15 years 8 months ago
ACLE: A Communication Environment for Asynchronous Collaborative Learning
The popularity of distributed learning and the continued growth in the number of colleges and universities offering courses delivered entirely via asynchronous learning networks (...
Timothy J. Ellis, William Hafner
ICMCS
2006
IEEE
121views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Packet Loss Modeling for Perceptually Optimized 3D Transmission
Transmissions over wireless and other unreliable networks can lead to packet loss. An area that has received limited research attention is how to tailor multimedia information tak...
Irene Cheng, Lihang Ying, Anup Basu