Sciweavers

8770 search results - page 1349 / 1754
» Named Service Networking
Sort
View
ACSAC
2006
IEEE
15 years 8 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
AINA
2004
IEEE
15 years 8 months ago
Can Streaming Of Stored Playback Video Be Supported On Peer to Peer Infrastructure?
Streaming live video over peers in the Internet is gaining popularity since it has the advantage of reducing the load on the server and enable the server to perform other speciali...
K. Kalapriya, S. K. Nandy, K. Venkatesh Babu
ARCS
2006
Springer
15 years 8 months ago
Background Data Acquisition and Carrying: The BlueDACS Project
As an alternative to ad hoc wireless sensor networks, we propose to utilize the mobile devices that are carried by people who walk along the site on which the sensors are deployed....
Thomas Wieland, Martin Fenne, Benjamin Stöcke...
ICSE
2000
IEEE-ACM
15 years 8 months ago
Software engineering for mobility: a roadmap
The term distributed computing conjures the image of a fixed network structure whose nodes support the execution of processes that communicate with each other via messages traveli...
Gruia-Catalin Roman, Gian Pietro Picco, Amy L. Mur...
AAAI
2007
15 years 7 months ago
Analyzing Reading Behavior by Blog Mining
This paper presents a study of the various aspects of blog reading behavior. The analyzed data are obtained from a Japanese weblog hosting service, Doblog. Four kinds of social ne...
Tadanobu Furukawa, Mitsuru Ishizuka, Yutaka Matsuo...
« Prev « First page 1349 / 1754 Last » Next »