Sciweavers

3016 search results - page 496 / 604
» Disappearing mobile devices
Sort
View
AUTONOMICS
2008
ACM
13 years 11 months ago
R-P2P: a data centric DTN middleware with interconnected throwboxes
In this paper we describe R-P2P, a novel system meant to support the search and retrieval of data in a given area. RP2P couples opportunistic wireless communications between mobil...
Francesco De Pellegrini, Iacopo Carreras, Daniele ...
CAISE
2008
Springer
13 years 11 months ago
Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems
A recent trend in Ubiquitous Computing is that embedded software (e.g. in production machines, wired or wireless networked sensors and actuators, or RFID readers) directly offers W...
Patrik Spieß, Dinh Khoa Nguyen, Ingo Weber, ...
CTRSA
2008
Springer
113views Cryptology» more  CTRSA 2008»
13 years 11 months ago
Aggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on ...
Jonathan Katz, Andrew Y. Lindell
BNCOD
2007
151views Database» more  BNCOD 2007»
13 years 10 months ago
Compressed Materialised Views of Semi-Structured Data
Query performance issues over semi-structured data have led to the emergence of materialised XML views as a means of restricting the data structure processed by a query. However p...
Richard Gourlay, Brian Tripney, John N. Wilson
DBSEC
2007
151views Database» more  DBSEC 2007»
13 years 10 months ago
Location Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications th...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...