Sciweavers

1647 search results - page 69 / 330
» Distributing private data in challenged network environments
Sort
View
137
Voted
HICSS
2007
IEEE
140views Biometrics» more  HICSS 2007»
15 years 10 months ago
Coordination Network Analysis: A Research Framework for Studying the Organizational Impacts of Service-Orientation in Business I
Business intelligence (BI) technology and research is maturing. In evidence, some practitioners have indicated a shift in the nature of their data warehousing challenges from bein...
Mark Keith, Haluk Demirkan, Michael Goul
113
Voted
JSAC
2006
127views more  JSAC 2006»
15 years 3 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
EUSAI
2007
Springer
15 years 10 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany
132
Voted
MOBIHOC
2003
ACM
15 years 9 months ago
PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems
Reliable storage of data with concurrent read/write accesses (or query/update) is an ever recurring issue in distributed settings. In mobile ad hoc networks, the problem becomes e...
Jun Luo, Jean-Pierre Hubaux, Patrick Th. Eugster
127
Voted
SPDP
1991
IEEE
15 years 7 months ago
Local vs. global memory in the IBM RP3: experiments and performance modelling
A number of experiments regarding the placement of instructions, private data and shared data in the Non-Uniform-Memory-Access multiprocessor, RP3 has been performed. Three Scient...
Mats Brorsson