Sciweavers

1776 search results - page 271 / 356
» Informational cascades in IT adoption
Sort
View
JSAC
2006
114views more  JSAC 2006»
15 years 1 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
JUCS
2006
143views more  JUCS 2006»
15 years 1 months ago
Context-Aware QoS Provision for Mobile Ad-hoc Network -based Ambient Intelligent Environments
: Lately, wireless networks have gained acceptance for home networking. Low cost installation, flexibility and no fixed infrastructures have made it possible home environments rapi...
Felix Jesús Villanueva, David Villa, Franci...
PR
2008
146views more  PR 2008»
15 years 1 months ago
Retrieval of machine-printed Latin documents through Word Shape Coding
This paper reports a document retrieval technique that retrieves machine-printed Latin-based document images through word shape coding. Adopting the idea of image annotation, a wo...
Shijian Lu, Chew Lim Tan
PERVASIVE
2006
Springer
15 years 1 months ago
Collaborative Localization: Enhancing WiFi-Based Position Estimation with Neighborhood Links in Clusters
Abstract. Location-aware services can benefit from accurate and reliable indoor location tracking. The widespread adoption of 802.11x wireless LAN as the network infrastructure cre...
Li-Wei Chan, Ji-Rung Chiang, Yi-Chao Chen, Chia-na...
TAP
2008
Springer
94views Hardware» more  TAP 2008»
15 years 1 months ago
Vacuity in Testing
Abstract. In recent years, we see a growing awareness to the importance of assessing the quality of specifications. In the context of model checking, this can be done by analyzing ...
Thomas Ball, Orna Kupferman