Sciweavers

981 search results - page 157 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
JCP
2006
110views more  JCP 2006»
15 years 1 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
DATE
2008
IEEE
121views Hardware» more  DATE 2008»
15 years 3 months ago
Constraint Refinement for Online Verifiable Cross-Layer System Adaptation
Adaptive resource management is critical to ensuring the quality of real-time distributed applications, particularly for energy-constrained mobile handheld devices. In this contex...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
MHCI
2009
Springer
15 years 8 months ago
Industrial case study of the MICA support system for warehouse workers
Returns caused by the delivery of incorrect items constitute a major problem for non-automated warehouses. Returns not only create extra costs, they also aggravate customers. Most...
Christian Prause, Markus Eisenhauer, Lukas Gillman...
BMCBI
2006
109views more  BMCBI 2006»
15 years 1 months ago
An integrated system for genetic analysis
Background: Large-scale genetic mapping projects require data management systems that can handle complex phenotypes and detect and correct high-throughput genotyping errors, yet a...
Simon Fiddy, David Cattermole, Dong Xie, Xiao Yuan...
IMC
2007
ACM
15 years 3 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...