Sciweavers

501 search results - page 83 / 101
» Access control and key management for mobile agents
Sort
View
EENERGY
2010
14 years 3 days ago
Energy saving and network performance: a trade-off approach
Power consumption of the Information and Communication Technology sector (ICT) has recently become a key challenge. In particular, actions to improve energy-efficiency of Internet...
Carla Panarello, Alfio Lombardo, Giovanni Schembra...
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 9 months ago
Network evolution and QOS provisioning for integrated femtocell/macrocell networks
Integrated femtocell/macrocell networks, comprising a conventional cellular network overlaid with femtocells, offer an economically appealing way to improve coverage, quality of s...
Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J...
UCS
2007
Springer
14 years 2 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
ICDCS
2007
IEEE
14 years 20 days ago
Efficient Execution of Continuous Incoherency Bounded Queries over Multi-Source Streaming Data
On-line decision making often involves query processing over time-varying data which arrives in the form of data streams from distributed locations. In such environments typically...
Manish Bhide, Krithi Ramamritham, Mukund Agrawal
PERVASIVE
2008
Springer
13 years 8 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...