Sciweavers

6122 search results - page 1129 / 1225
» Securing network access in wireless sensor networks
Sort
View
VIZSEC
2005
Springer
15 years 3 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
PERCOM
2009
ACM
15 years 10 months ago
High Accuracy Context Recovery using Clustering Mechanisms
This paper examines the recovery of user context in indoor environments with existing wireless infrastructures to enable assistive systems. We present a novel approach to the extra...
Dinh Q. Phung, Brett Adams, Kha Tran, Svetha Venka...
MOBILWARE
2009
ACM
15 years 4 months ago
Middleware Solutions for Self-organizing Multi-hop Multi-path Internet Connectivity Based on Bluetooth
The availability of heterogeneous wireless interfaces and of growing computing resources on widespread portable devices pushes for enabling innovative deployment scenarios where mo...
Paolo Bellavista, Carlo Giannelli
WCNC
2008
IEEE
15 years 4 months ago
Exploiting Historical Spectrum Occupancy Information for Adaptive Spectrum Sensing
—At present wireless devices are able to select their working frequency only to a limited extend although several measurements have shown that the current spectrum regulations ar...
Matthias Wellens, Alexandre de Baynast, Petri M&au...
DEXAW
2006
IEEE
129views Database» more  DEXAW 2006»
15 years 4 months ago
Interaction Styles for Service Discovery in Mobile Business Applications
As the power of mobile devices continues to grow, and the range of resources accessible via wireless networks expands, there is an increasing need to offer services to users in a ...
Markus Aleksy, Colin Atkinson, Philipp Bostan, Tho...
« Prev « First page 1129 / 1225 Last » Next »