Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Malkani, Yasir Arfat"'
Autor:
Malkani, Yasir Arfat
Ad hoc interactions between devices over wireless networks in ubiquitous computing environments present a security problem: the generation of shared secrets to initialize secure communication over a medium that is inherently vulnerable to various att
Externí odkaz:
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.554765
Publikováno v:
Lachhman Das Dhomeja, Yasir Arfat Malkani, Asad Ali Shaikh and Ayaz Keerio, "Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous Environments ", International Journal of UbiComp (IJU), Vol.2, No.4, October 2011
Context-awareness is an essential requirement for pervasive computing applications, which enables them to adapt and perform tasks based on context. One of the adaptive features of context-awareness is contextual reconfiguration. Contextual reconfigur
Externí odkaz:
http://arxiv.org/abs/1201.1204
Publikováno v:
International Journal of Network Security & Its Applications 1.3 (2009) 39-50
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computing systems due to the ad-hoc and spontaneous nature of interactions amo
Externí odkaz:
http://arxiv.org/abs/1004.0769
Sindhi language is primarily spoken in the Sindh province of Pakistan, and in some parts of India. Languages phonemic inventory include vowels, consonants and diphthongs. This paper presents acoustic analysis and properties of the glide consonants of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::357487ffae5ac9c04087c3d21b3741b7
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computing systems due to the ad-hoc and spontaneous nature of interactions amo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::11050f782d8a726d199bbb9ced609e15
Publikováno v:
2015 Conference on Information Assurance & Cyber Security (CIACS); 1/1/2015, p50-55, 6p
Publikováno v:
Mehran University Research Journal of Engineering & Technology; Oct2016, Vol. 35 Issue 4, p561-568, 8p
Publikováno v:
17th IEEE International Multi Topic Conference 2014; 2014, p205-210, 6p
Publikováno v:
Mehran University Research Journal of Engineering & Technology; Oct2015, Vol. 34 Issue 4, p413-424, 12p
Publikováno v:
Proceedings of the 8th International Conference: Frontiers of Information Technology; 12/21/2010, p1-6, 6p