Sciweavers

283 search results - page 6 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
135
Voted
PERCOM
2007
ACM
16 years 3 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
MOBISYS
2010
ACM
15 years 6 months ago
CrowdSearch: exploiting crowds for accurate real-time image search on mobile phones
Mobile phones are becoming increasingly sophisticated with a rich set of on-board sensors and ubiquitous wireless connectivity. However, the ability to fully exploit the sensing c...
Tingxin Yan, Vikas Kumar, Deepak Ganesan
ICDCSW
2007
IEEE
15 years 10 months ago
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
1 Challenges of scale have limited the development of event notification systems with strong properties, despite the urgent demand for consistency, reliability, security, and other...
Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrow...
AP2PC
2004
Springer
15 years 9 months ago
On Exploiting Agent Technology in the Design of Peer-to-Peer Applications
Abstract. Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of ap...
Steven Willmott, Josep M. Pujol, Ulises Cort&eacut...
149
Voted
MOBICOM
2006
ACM
15 years 10 months ago
A coordinate-based approach for exploiting temporal-spatial diversity in wireless mesh networks
In this paper, we consider the problem of mitigating interference and improving network capacity in wireless mesh networks from the angle of temporal-spatial diversity. In a nutsh...
Hyuk Lim, Chaegwon Lim, Jennifer C. Hou