Sciweavers

741 search results - page 115 / 149
» Abstract Machines for Communication Security
Sort
View
IPSN
2005
Springer
14 years 3 months ago
Building up to macroprogramming: an intermediate language for sensor networks
Abstract— There is widespread agreement that a higher level programming model for sensor networks is needed. A variety of models have been developed, but the community is far fro...
Ryan Newton, Arvind, Matt Welsh
SC
2004
ACM
14 years 3 months ago
A High Performance Java Middleware with a Real Application
Previous experiments with high-performance Java were initially disappointing. After several years of optimization, this paper investigates the current suitability of such object-o...
Fabrice Huet, Denis Caromel, Henri E. Bal
ECTEL
2008
Springer
13 years 11 months ago
Knowledge Management in the Communities of Practice of e-Learning
Abstract. A lot of research has been done to promote and develop good elearning models, practices, and technological environments. However, fewer efforts were deployed to support e...
Akila Sarirete
SWS
2004
ACM
14 years 3 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
ACISP
2005
Springer
14 years 3 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...