Sciweavers

144 search results - page 22 / 29
» Emergency Response Communications and Associated Security Ch...
Sort
View
INFOCOM
2008
IEEE
14 years 1 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
INFOCOM
2008
IEEE
14 years 1 months ago
HERO: Online Real-Time Vehicle Tracking in Shanghai
—Intelligent transportation systems have become increasingly important for the public transportation in Shanghai. In response, ShanghaiGrid (SG) aims to provide abundant intellig...
Hongzi Zhu, Yanmin Zhu, Minglu Li, Lionel M. Ni
WIESS
2000
13 years 8 months ago
Operational Information Systems: An Example from the Airline Industry
Our research is motivated by the scaleability, availability, and extensibility challenges in deploying open systems based, enterprise operational applications. We present Delta�...
Van Oleson, Karsten Schwan, Greg Eisenhauer, Beth ...
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 1 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
SWS
2004
ACM
14 years 27 days ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang