Sciweavers

2061 search results - page 350 / 413
» Authorization for Metacomputing Applications
Sort
View
141
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
113
Voted
DCC
2007
IEEE
16 years 3 months ago
On Compression of Encrypted Video
We consider video sequences that have been encrypted uncompressed. Since encryption masks the source, traditional data compression algorithms are rendered ineffective. However, it...
Daniel Schonberg, Chuohao Yeo, Stark C. Draper, Ka...
119
Voted
MOBIHOC
2003
ACM
16 years 3 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
111
Voted
ECIR
2009
Springer
16 years 27 days ago
Word Particles Applied to Information Retrieval
Document retrieval systems conventionally use words as the basic unit of representation, a natural choice since words are primary carriers of semantic information. In this paper w...
Evandro B. Gouvêa, Bhiksha Raj
146
Voted
EUROSYS
2007
ACM
16 years 24 days ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso