Sciweavers

1647 search results - page 72 / 330
» Distributing private data in challenged network environments
Sort
View
146
Voted
FGCS
2008
159views more  FGCS 2008»
15 years 3 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
CSREAPSC
2006
15 years 5 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal
SAC
2010
ACM
15 years 10 months ago
Infrastructureless storage in dynamic environments
This paper studies the use of highly dynamic networks as infrastructures for persistent storage of data that offer services at specific geographical zones in a decentralized and...
Jose Luis Fernandez-Marquez, Josep Lluís Ar...
144
Voted
CW
2003
IEEE
15 years 9 months ago
This Year in the MOVES Institute
The MOVES Institute’s mission is research, application, and education in the grand challenges of modeling, virtual environments, and simulation. Specialties are 3D visual simula...
Michael Zyda, Donald P. Brutzman, Rudy Darken, Joh...
172
Voted
LCN
2007
IEEE
15 years 10 months ago
Distributed CDMA-based MAC Protocol for Underwater Sensor Networks
—Underwater Sensor Networks are typically distributed in nature and the nodes communicate using acoustic waves over a wireless medium. Such networks are characterized by long and...
Hwee Xian Tan, Winston Khoon Guan Seah