Sciweavers

1498 search results - page 71 / 300
» Collection tree protocol
Sort
View
ATAL
2003
Springer
14 years 1 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
COMPSAC
2009
IEEE
14 years 4 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data fulï¬...
Rafael Accorsi
ICC
2009
IEEE
159views Communications» more  ICC 2009»
14 years 4 months ago
An Enhanced Multiple-Feedback Algorithm for RFID MAC Protocols
Abstract— This paper introduces two new tree-based anticollision schemes using multiple feedback symbols for uplink tag random access of emerging radio frequency identification (...
You-Chang Ko, Sumit Roy, Choong-Ho Cho, Hyong-Woo ...
COCOON
2008
Springer
13 years 12 months ago
Approximating the Generalized Capacitated Tree-Routing Problem
In this paper, we introduce the generalized capacitated tree-routing problem (GCTR), which is described as follows. Given a connected graph G = (V, E) with a sink s V and a set M...
Ehab Morsy, Hiroshi Nagamochi
MADNES
2005
Springer
14 years 3 months ago
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract ...
Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong