Sciweavers

295 search results - page 43 / 59
» Dynamic Access Control for Multi-privileged Group Communicat...
Sort
View
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
ICOIN
2004
Springer
14 years 27 days ago
On Layered VPN Architecture for Enabling User-Based Multiply Associated VPNs
Abstract. In our previous work, we have proposed a new VPN architecture for enabling user-based multiply associated VPNs [1]. Almost all existing VPN technologies assume that users...
Yoshihiro Hara, Hiroyuki Ohsaki, Makoto Imase, Yos...
PDC
2004
ACM
14 years 29 days ago
Participatory design in community computing contexts: tales from the field
As technology becomes more embedded in our daily lives, there is a great deal of hope about the use of information technology to achieve positive community outcomes like increasin...
Cecelia Merkel, Lu Xiao, Umer Farooq, Craig H. Gan...
FGCS
2002
153views more  FGCS 2002»
13 years 7 months ago
HARNESS fault tolerant MPI design, usage and performance issues
Initial versions of MPI were designed to work efficiently on multi-processors which had very little job control and thus static process models. Subsequently forcing them to suppor...
Graham E. Fagg, Jack Dongarra
EUROPKI
2006
Springer
13 years 11 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng