The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents S-Aframe, an agent-based multilayer framework with context-aware semantic service (CSS) to support the development and deployment of context-aware applications for vehicular social networks (VSNs) formed by in-vehicle or mobile devices used by drivers, passengers, and pedestrians. The programming model of the framework incorporates features that support collaborations between mobile...
This paper proposes a novel service-oriented mobile social networking platform called MS2A for disaster situations. MS2A consists of two layers: service layer and application layer. The service layer is implemented based on the service-oriented architecture (SOA) to ease application developments. By extending and composing the web services at this layer, application developers can efficiently and...
Mobile WiMax is a suitable wireless technology for networked vehicular applications because of its mobility support at vehicular speeds and its inherent wide coverage, which minimizes the rate of handover and thus data loss due to disrupted communication. Apart from vehicular mobility, the terrain over which the network is deployed will also impact the network due to its effects on wireless signal...
In ad hoc networks, the vulnerability of nodes to routing attacks is a serious concern. In this work we propose a cross-layer based routing attack detection system for ad hoc networks. Previous work that uses mostly audit trails collected from the routing protocol suffers from inadequacy of features to construct a reliable model for detecting anomalous routing behavior. On the other hand, use of linear...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.