Sciweavers

674 search results - page 57 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
DAC
2007
ACM
14 years 8 months ago
Dynamic Power Management with Hybrid Power Sources
DPM (Dynamic Power Management) is an effective technique for reducing the energy consumption of embedded systems that is based on migrating to a low power state when possible. Whi...
Jianli Zhuo, Chaitali Chakrabarti, Kyungsoo Lee, N...
ICCS
2009
Springer
14 years 9 days ago
GRID Resource Searching on the GridSim Simulator
Nowadays, the Grid is the focus of multiple researches. Our work is centered on Resource Management for Grids as it is an opened and current research area. Decentralized, scalable ...
Antonia Gallardo, Luis Díaz de Cerio, Roc M...
ESORICS
1994
Springer
13 years 11 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
APNOMS
2007
Springer
14 years 1 months ago
A Density Based Clustering for Node Management in Wireless Sensor Network
This paper represents a new clustering approach for wireless sensor network. It is a decentralized algorithm having the topology control information in each sensor node. A post lea...
Md. Obaidur Rahman, Byung Goo Choi, Muhammad Mosta...
ICC
2007
IEEE
136views Communications» more  ICC 2007»
13 years 11 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar