Differential Evolution Optimization of TSCH Scheduling for Heterogeneous Sensor Networks | 0 | 0.34 | 2022 |
Implementation and Test of DSRC Standard on a Wireless Communication-Based Active Safety System. | 0 | 0.34 | 2019 |
Fixed Node Assisted Collection Tree Protocol For Mobile Wireless Sensor Networks | 0 | 0.34 | 2019 |
Inside out - A study of users’ perceptions of password memorability and recall | 2 | 0.37 | 2019 |
Improving Localization in Sensor Networks by Leveraging Inter-node Ranking of Received Signal Strength and Clustering. | 0 | 0.34 | 2019 |
Have We Met Before? Using Consumer-Grade Brain-Computer Interfaces to Detect Unaware Facial Recognition | 2 | 0.42 | 2018 |
Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments. | 0 | 0.34 | 2017 |
An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine. | 17 | 0.56 | 2017 |
What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability | 1 | 0.35 | 2017 |
Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs. | 0 | 0.34 | 2016 |
Comparative Analysis of Prominent Middleware Platforms in the Domain of Ambient Assisted Living (AAL) for an Older Adults with Dementia (OAwD) Scenario. | 1 | 0.36 | 2016 |
Evaluating Hamming Distance as a CRC-based Side-channel Detection Measure in Wi-Fi Networks. | 0 | 0.34 | 2016 |
Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces. | 0 | 0.34 | 2016 |
Tinypolicy: A Distributed Policy Based Management Framework For Wireless Sensor Networks | 0 | 0.34 | 2015 |
Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networks | 3 | 0.48 | 2015 |
3d Localization In Large-Scale Wireless Sensor Networks: A Micro-Differential Evolution Approach | 2 | 0.39 | 2014 |
Distributed policy based management for wireless sensor networks to support the internet of things environment | 0 | 0.34 | 2014 |
Determining Fuzzy Link Quality Membership Functions in Wireless Sensor Networks | 0 | 0.34 | 2014 |
Bloom Filter Supporting Distributed Policy-Based Management in Wireless Sensor Networks. | 0 | 0.34 | 2013 |
Integrated Development Environment for Debugging Policy-based Applications in Wireless Sensor Networks. | 0 | 0.34 | 2013 |
Enhancing Collection Tree Protocol for Mobile Wireless Sensor Networks. | 0 | 0.34 | 2013 |
UML Modelling of Design Patterns for Wireless Sensor Networks. | 1 | 0.36 | 2013 |
Framework for Distributed Policy-Based Management in Wireless Sensor Networks to Support Autonomic Behavior. | 5 | 0.44 | 2012 |
Distributed Policy-Based Management for Wireless Sensor Networks. | 0 | 0.34 | 2012 |
Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS. | 6 | 0.64 | 2011 |
Wireless Sensor Actor Network Simulation for a Fire Extinguishing System. | 1 | 0.37 | 2011 |
Simulation of DDOS Attacks on P2P Networks | 3 | 0.46 | 2011 |
Network performance of a wireless sensor network for temperature monitoring in vineyards | 2 | 0.48 | 2011 |
Ubiquitous Intelligence and Computing - 7th International Conference, UIC 2010, Xi'an, China, October 26-29, 2010. Proceedings | 49 | 2.74 | 2010 |
Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems | 6 | 0.62 | 2010 |
Design of a Wireless Sensor Network from an Energy Management Perspective | 3 | 0.65 | 2010 |
Vehicle traffic congestion management in vehicular ad-hoc networks | 20 | 1.61 | 2009 |
A Frame Handler Module For A Side-Channel In Mobile Ad Hoc Networks | 7 | 0.78 | 2009 |
Dynamic Role Assignment Using Semantic Contexts | 1 | 0.36 | 2009 |
IP address configuration in VANET using centralized DHCP | 14 | 0.80 | 2008 |
A Context-Based Delegation Access Control Model for Pervasive Computing | 2 | 0.37 | 2007 |
Performance Measurement of XML Compression Algorithms for DSRC Messages | 0 | 0.34 | 2007 |
User-credential based role mapping in multi-domain environment | 4 | 0.48 | 2006 |
Personalization of internet telephony services for presence with SIP and extended CPL | 2 | 0.49 | 2006 |
Managing Access Control for Presence-Based Services | 1 | 0.39 | 2005 |
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing | 5 | 0.72 | 2005 |
Projecting Web services using presence communication protocols for pervasive computing | 1 | 0.46 | 2005 |
Integrating Service Discovery Protocols with Presence-Based Communications for Ad Hoc Collaborative Scenarios | 2 | 0.42 | 2004 |
Session-Based Service Discovery and Access Control in Peer-to-Peer Communications | 0 | 0.34 | 2004 |
Context and Intent in Call Processing | 5 | 1.27 | 2003 |
Indoor Ad Hoc Proximity-Location Sensing for Service Provider Selection | 2 | 0.40 | 2003 |
Agent-Based Context-Aware Ad hoc Communication | 4 | 0.95 | 2002 |
Software modeling for embedded and mobile sensor system | 0 | 0.34 | 2001 |
A multi-agent system for personal messaging | 1 | 0.38 | 2000 |
Toward a Mobile Work Environment | 1 | 0.37 | 2000 |