Sciweavers

450 search results - page 46 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
INFOCOM
2007
IEEE
15 years 4 months ago
Aloha-Based MAC Protocols with Collision Avoidance for Underwater Acoustic Networks
— Unlike terrestrial networks that mainly rely on radio waves for communications, underwater networks utilize acoustic waves, which have comparatively lower loss and longer range...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
ISCC
2006
IEEE
15 years 3 months ago
Security for the Mythical Air-Dropped Sensor Network
The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The secu...
Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andr...
ICDIM
2010
IEEE
14 years 7 months ago
Social network collaborative filtering framework and online trust factors: A case study on Facebook
Recommender systems have been proposed to exploit the potential of social network by filtering the information and offer recommendations to a user that he is predicted to like. Co...
Wei Chen, Simon Fong
MOBIHOC
2008
ACM
15 years 9 months ago
Routing in a cyclic mobispace
A key challenge of routing in delay tolerant networks (DTNs) is to find routes that have high delivery rates and low endto-end delays. When oracles are not available for future co...
Cong Liu, Jie Wu
CISS
2007
IEEE
14 years 11 months ago
Echo-Cancellation for Ultrasonic Data Transmission through a Metal Channel
– The process control industry has shown great interest in implementation of low cost, low power wireless sensor networks. Such networks are much easier to deploy and reconfigure...
Richard Primerano, Kevin Wanuga, Joseph Dorn, Mosh...