Sciweavers

868 search results - page 131 / 174
» An Architecture for a Secure Service Discovery Service
Sort
View
ICUMT
2009
13 years 5 months ago
Visualizations of human activities in sensor-enabled ubiquitous environments
Abstract--Sensor network ubiquitous environments may generate a lot of data including heterogeneous `raw' sensor data, low-level feature and/or trend data and higher-level con...
Brian J. d'Auriol, Le Xuan Hung, Sungyoung Lee, Yo...
SIGCOMM
2012
ACM
11 years 10 months ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
IEEEARES
2006
IEEE
14 years 1 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
SEC
2003
13 years 9 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
PERCOM
2005
ACM
14 years 7 months ago
A Dynamic Lightweight Platform for Ad-Hoc Infrastructures
Mobile devices like PDAs or mobile phones have become widespread. Similarly, network functionality like GSM, Bluetooth, or WLAN has become standard. Nevertheless, not many applica...
Andreas Frei, Gustavo Alonso