Sciweavers

3497 search results - page 658 / 700
» Mining in a mobile environment
Sort
View
104
Voted
SECON
2010
IEEE
14 years 11 months ago
Traffic Inference in Anonymous MANETs
Abstract--The open wireless medium in a mobile ad-hoc network (MANET) enables malicious traffic analysis to dynamically infer the network traffic pattern in hostile environments. T...
Yunzhong Liu, Rui Zhang, Jing Shi, Yanchao Zhang
93
Voted
TRIDENTCOM
2010
IEEE
14 years 11 months ago
COMCON: Use Cases for Virtual Future Networks
Abstract-- It is expected from a Future Internet that a multitude of networks will coexist and complement each other. Such environment allows to run specialized networks possibly p...
Daniel Schlosser, Marco Hoffmann, Tobias Hoß...
WICON
2010
14 years 11 months ago
Distributed Management of Contextual Affinities in Context-aware Systems
In context-aware computing, distributed information about entities, such as people, places and objects, is captured and made available to applications, which utilize this context....
Robert Schmohl, Uwe Baumgarten
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
14 years 11 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
147
Voted
GLOBECOM
2009
IEEE
14 years 11 months ago
Cooperative Communications with Relay Selection for QoS Provisioning in Wireless Sensor Networks
Abstract--Cooperative communications have been demonstrated to be effective in combating the multiple fading effects in wireless networks, and improving the network performance in ...
Xuedong Liang, Ilangko Balasingham, Victor C. M. L...