Sciweavers

2268 search results - page 385 / 454
» Modeling wireless shadow networks
Sort
View
PERCOM
2008
ACM
16 years 4 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
PERCOM
2008
ACM
16 years 4 months ago
Multiagent Place-Based Virtual Communities for Pervasive Computing
This paper proposes a multiagent based virtual community as a new means to support pervasive computing services. We give a conceptual definition of the concept of Place-Based Virt...
Tuan Nguyen, Seng Wai Loke, Torab Torabi, Hongen L...
142
Voted
PERCOM
2007
ACM
16 years 4 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
PERCOM
2005
ACM
16 years 4 months ago
Applying a Disciplined Approach to the Development of a Context-Aware Communication Application
Pervasive computing applications must be engineered to provide unprecedented levels of flexibility in order to reconfigure and adapt in response to changes in computing resources ...
Ted McFadden, Karen Henricksen, Jadwiga Indulska, ...
PERCOM
2005
ACM
16 years 4 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...