Sciweavers

454 search results - page 65 / 91
» Making Sense of VAST Data
Sort
View
SOUPS
2006
ACM
15 years 4 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
WCNC
2010
IEEE
15 years 2 months ago
A Reliable Energy-Efficient 802.15.4-Based MAC Protocol for Wireless Sensor Networks
—The IEEE 802.15.4 standard was developed for the purpose of media access control of low power wireless personal area networks. Wireless sensor network devices have the general c...
Yasser Gadallah, Mariam Jaafari
FLAIRS
2006
14 years 11 months ago
Agile Sensor Networks: Adaptive Coverage via Mobile Nodes
Advances in sensing and communication technology make sensor networks a convenient and cost effective tool for collecting data in hard to reach and hazardous areas Increasingly, s...
Swapna Ghanekar, Fatma Mili, Imad Elhajj
IJSS
2007
82views more  IJSS 2007»
14 years 10 months ago
A holistic method for finding out critical features of industry maintenance services
— The purpose of this case study is to create a competitive operative management system for efficiency and quality performance for a company running maintenance service business ...
Juha-Matti Ranta, Josu Takala
MOBICOM
2010
ACM
14 years 10 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao