Sciweavers

336 search results - page 54 / 68
» Mobile values, new names, and secure communication
Sort
View
76
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
INTERNET
2010
119views more  INTERNET 2010»
14 years 8 months ago
A Chat Application in Lift
s the HTTP request–response cycle rather than wrapping HTTP concepts in APIs. This means you put HTML element definition and action in the same place: var name = "" SHt...
David Pollak, Steve Vinoski
CEC
2010
IEEE
14 years 1 months ago
Co-evolutionary search path planning under constrained information-sharing for a cooperative unmanned aerial vehicle team
—Mobile cooperative sensor networks are increasingly used for surveillance and reconnaissance tasks to support domain picture compilation. However, efficient distributed informat...
Jean Berger, Jens Happe
VTC
2010
IEEE
146views Communications» more  VTC 2010»
14 years 8 months ago
Effective SNR Based Handoff Scheme in Heterogeneous Cellular Environments
—In cellular systems, a handoff process is defined to transfer an active call of an MS from one cell to another in order to provide a seamless service to this MS. Generally, a h...
Dongmyoung Kim, Du Ho Kang, Sunghyun Choi
WISEC
2010
ACM
15 years 4 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...