Sciweavers

5446 search results - page 479 / 1090
» Mobile computing
Sort
View
SAC
2009
ACM
15 years 11 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
ICDCS
2008
IEEE
15 years 11 months ago
Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks
Wireless sensor networks (WSNs) deployed for missioncritical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes w...
Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Hu...
IROS
2008
IEEE
129views Robotics» more  IROS 2008»
15 years 11 months ago
Near-optimal navigation of high speed mobile robots on uneven terrain
—This paper proposes a method for near-optimal navigation of high speed mobile robots on uneven terrain. The method relies on a layered control strategy. A high-level planning la...
Karl Iagnemma, Shingo Shimoda, Zvi Shiller
ACSC
2006
IEEE
15 years 11 months ago
Interaction design for a mobile context-aware system using discrete event modelling
This paper describes our experience when applying formal methods in the design of the tourist information system TIP, which presents context-sensitive information to mobile users ...
Annika Hinze, Petra Malik, Robi Malik
148
Voted
ICDCS
2006
IEEE
15 years 11 months ago
Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc Networks
This paper presents an analysis of the control overhead involved in clustering and routing for one-hop clustered mobile ad hoc networks. Previous work on the analysis of control o...
Mingqiang Xue, Inn Inn Er, Winston Khoon Guan Seah