Sciweavers

3486 search results - page 627 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
IWIA
2005
IEEE
15 years 3 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
GLOBECOM
2008
IEEE
15 years 4 months ago
Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs
— Failure-Rate Minimization is becoming one of the major design issues in wireless sensor network (WSN) architecture due to multiple available Functional-units (FUs). There is a ...
Meikang Qiu, Jing Deng, Edwin Hsing-Mean Sha
PDCAT
2005
Springer
15 years 3 months ago
Collaborative MPEG-4 Contents Authoring, Presentation and Interaction in a Mobile Environment
Recent advances in wireless technology and availability of portable devices with networking capabilities made the increasing hot topic, ubiquitous computing become reality. Also, ...
SongLu Li, Sangwook Kim, Sunkyung Kim
ACMICEC
2004
ACM
90views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
SmartRestaurant: mobile payments in context-aware environment
Mobility, context-awareness and payment combined provide a customer with a completely new setting of consuming services at any time and any place. We introduce SmartRestaurant ser...
Janne Lukkari, Jani Korhonen, Timo Ojala
WETICE
2003
IEEE
15 years 3 months ago
Coordination in Pervasive Computing Environments
Computer science and engineering nowadays appears to be challenged (and driven) by technological progress and quantitative growth. Among the technological progress challenges are ...
Alois Ferscha