Sciweavers

1132 search results - page 154 / 227
» Application of Grid Security to Personal Distributed Environ...
Sort
View
CCS
2010
ACM
13 years 7 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
SAC
2011
ACM
12 years 11 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
ISCC
2005
IEEE
162views Communications» more  ISCC 2005»
14 years 1 months ago
A JXTA Compliant Framework for Mobile Handheld Devices in Ad Hoc Networks
The availability of powerful personal computers and high bandwidth home connectivity is changing the way users cooperate and exchange information on the network. Peer to peer comp...
Mario Bisignano, Giuseppe Di Modica, Orazio Tomarc...
WDAG
2007
Springer
128views Algorithms» more  WDAG 2007»
14 years 2 months ago
From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors
Abstract. This paper studies the impact of omission failures on asynchronous distributed systems with crash-stop failures. We provide two different transformations for algorithms,...
Carole Delporte-Gallet, Hugues Fauconnier, Felix C...
ICCSA
2009
Springer
14 years 3 months ago
ODDUGI: Ubiquitous Mobile Agent System
A mobile agent is regarded as an attractive technology when developing distributed applications in mobile and ubiquitous computing environments. In this paper, we present ODDUGI, a...
SungJin Choi, Hyunseung Choo, MaengSoon Baik, Hong...