Sciweavers

4330 search results - page 747 / 866
» Analyzing security architectures
Sort
View
99
Voted
SECON
2007
IEEE
15 years 10 months ago
Query privacy in wireless sensor networks
— Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions but ...
Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pea...
AINTEC
2007
Springer
15 years 10 months ago
Gap Analysis in IP Multicast Dissemination
Abstract. IP multicast is advantageous for high quality streaming applications and future needs in the Internet. However, it is generally recognized that IP multicast requires sign...
Hitoshi Asaeda, Bill Manning
BTW
2007
Springer
185views Database» more  BTW 2007»
15 years 10 months ago
Data Staging for OLAP- and OLTP-Applications on RFID Data
: The emerging trend towards seamless monitoring of all business processes via comprehensive sensor networks – in particular RFID readers – creates new data management challeng...
Stefan Krompass, Stefan Aulbach, Alfons Kemper
120
Voted
ECUMN
2007
Springer
15 years 10 months ago
Toward Scalable Management of Multiple Service Levels in IP Networks
This paper analyzes and discusses the role of a distributed and simple admission control (AC) model in achieving scalable management of multiple network service levels. The model ...
Solange Rito Lima, Paulo Carvalho, Vasco Freitas
120
Voted
FPL
2007
Springer
105views Hardware» more  FPL 2007»
15 years 10 months ago
Time Predictable CPU and DMA Shared Memory Access
In this paper, we propose a first step towards a time predictable computer architecture for single-chip multiprocessing (CMP). CMP is the actual trend in server and desktop syste...
Christof Pitter, Martin Schoeberl