Sciweavers

193 search results - page 30 / 39
» Ad Hoc Data and the Token Ambiguity Problem
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel
LCN
2006
IEEE
14 years 1 months ago
A Congestion-aware Medium Access Control Protocol for Multi-rate Ad-hoc Networks
This paper investigates the problem of how to improve TCP performance in multi-rate Ad-hoc networks with congested links. To improve network performance, different rate adaptation...
Timo Zauner, Luke Haslett, Wen Hu, Sanjay Jha, Cor...
BPM
2009
Springer
126views Business» more  BPM 2009»
13 years 11 months ago
Micro Workflow Gestural Analysis: Representation in Social Business Processes
Abstract. Enterprises are finding limitations with current modelling and hierarchical methodologies which have human agents as a key component. By requiring a priori knowledge of b...
Ben Jennings, Anthony Finkelstein
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
13 years 11 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
EJWCN
2010
119views more  EJWCN 2010»
13 years 2 months ago
Simulations of the Impact of Controlled Mobility for Routing Protocols
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Valeria Loscrì, Enrico Natalizio, Carmelo C...