Sciweavers

674 search results - page 56 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
SAINT
2006
IEEE
14 years 1 months ago
Dynamic Configuration of Semantic-Based Service Provisioning to Portable Devices
Context-awareness is starting to emerge as a key driving principle for the design and provisioning of pervasive services in pervasive computing environments. Semantic languages se...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
COMPSAC
2010
IEEE
13 years 5 months ago
Design and Implementation of a Middleware for Development and Provision of Stream-Based Services
This paper proposes MISSA, a novel middleware to facilitate the development and provision of stream-based services in emerging pervasive environments. The streambased services util...
Seungwoo Kang, Youngki Lee, Sunghwan Ihm, Souneil ...
IJNSEC
2007
138views more  IJNSEC 2007»
13 years 7 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
BDIM
2007
IEEE
95views Business» more  BDIM 2007»
14 years 2 months ago
A Mechanism of Specifying and Determining Pricing in Utility Computing Environments
Utility services providers offer on-demand services for multiple users and applications from a shared resource pool. The utility computing environment provider manages resources th...
Jinsong Ouyang, Akhil Sahai, Jim Pruyne
TPDS
2008
161views more  TPDS 2008»
13 years 7 months ago
Distributed Deployment Schemes for Mobile Wireless Sensor Networks to Ensure Multilevel Coverage
One of the key research issues in wireless sensor networks (WSNs) is how to efficiently deploy sensors to cover an area. In this paper, we solve the k-coverage sensor deployment pr...
You-Chiun Wang, Yu-Chee Tseng