Skip to content

Advertisement

Articles

Page 5 of 5

  1. Content type: Research

    The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process...

    Authors: Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao

    Citation: Human-centric Computing and Information Sciences 2011 1:4

    Published on:

  2. Content type: Review

    The prevalence of multimedia applications has drastically increased the amount of multimedia data. With the drop of the hardware cost, more and more mobile devices with higher capacities are now used. The wide...

    Authors: Hongli Luo and Mei-Ling Shyu

    Citation: Human-centric Computing and Information Sciences 2011 1:5

    Published on:

  3. Content type: Research

    Information systems are being shifted to scalable architectures like Cloud and peer-to-peer (P2P) models. In this paper, we consider the P2P model as a fully distributed, scalable system different from central...

    Authors: Ailixier Aikebaier, Tomoya Enokido and Makoto Takizawa

    Citation: Human-centric Computing and Information Sciences 2011 1:6

    Published on: