Sciweavers

483 search results - page 52 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
138
Voted
SASN
2003
ACM
15 years 8 months ago
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
We present a security design for a general purpose, selforganizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. ...
Thomas S. Messerges, Johnas Cukier, Tom A. M. Keve...
149
Voted
CORR
2006
Springer
97views Education» more  CORR 2006»
15 years 3 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
153
Voted
PERCOM
2011
ACM
14 years 7 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
223
Voted
ICDE
2007
IEEE
158views Database» more  ICDE 2007»
16 years 4 months ago
Efficient Evaluation of Imprecise Location-Dependent Queries
In location-based services, it is common for a user to issue a query based on his/her current position. One such example is "find the available cabs within two miles of my cu...
Jinchuan Chen, Reynold Cheng
125
Voted
ASWC
2008
Springer
15 years 5 months ago
Integrating Lightweight Reasoning into Class-Based Query Refinement for Object Search
More and more RDF data have been published online to be consumed. Ordinary Web users also expect to experience more intelligent services promised by the Semantic Web, such as objec...
Gong Cheng, Yuzhong Qu