Sciweavers

1436 search results - page 125 / 288
» Personalized Redirection of Communication
Sort
View
144
Voted
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
15 years 10 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
ICC
2008
IEEE
135views Communications» more  ICC 2008»
15 years 10 months ago
Testbed Experimentation of a Meshed Tree Routing with Local Link State for Wireless PAN Mesh
— This paper focus on the testbed experimentation of a meshed tree routing algorithm with local link state for Wireless Personal Area networks (WPANs) based on current IEEE 802.1...
Rui Zhang, Tae Rim Park, Myung J. Lee, Hakyung Jun...
96
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Cyber-Fraud is One Typo Away
Abstract— Spelling errors when typing a URL can be exploited by website-squatters: users are led to phony sites in a phenomenon we call parasitic URL naming. These phony sites im...
Anirban Banerjee, Dhiman Barman, Michalis Faloutso...
171
Voted
WIMOB
2008
IEEE
15 years 10 months ago
A Multi-Sensing-Range Method for Position Estimation of Passive RFID Tags
— Recently, the RFID tag system is paid attention to as an identification source. Each RFID tag is attached to some object. With the unique ID of RFID tag, a user identifies the ...
Toshihiro Hori, Tomotaka Wada, Yuuki Ota, Norie Uc...
AI
2008
Springer
15 years 10 months ago
A Belief-Theoretic Reputation Estimation Model for Multi-context Communities
Online communities have grown to be an alternative form of communication for many people. This widespread growth and influence of the members of these communities in shaping the d...
Ebrahim Bagheri, M. Barouni-Ebrahimi, Reza Zafaran...