Sciweavers

8636 search results - page 1710 / 1728
» How Developers Copy
Sort
View
MASS
2010
156views Communications» more  MASS 2010»
13 years 5 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
PIMRC
2010
IEEE
13 years 5 months ago
An implementation of Cognitive Resource Management on LTE platform
Abstract--In this paper we describe an LTE based demonstrator of the Universal Link Layer API (ULLA) and Cognitive Resource Manager (CRM) modules that are developed in ARAGORN proj...
Tao Cai, Georgios P. Koudouridis, Johan Johansson,...
SECON
2010
IEEE
13 years 5 months ago
Prototyping Energy Harvesting Active Networked Tags (EnHANTs) with MICA2 Motes
Abstract--With the convergence of ultra-low-power communications and energy-harvesting technologies, networking selfsustainable ubiquitous devices is becoming feasible. Hence, we h...
Maria Gorlatova, T. Sharma, D. Shrestha, E. Xu, Ji...
SECRYPT
2010
129views Business» more  SECRYPT 2010»
13 years 5 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
TRIDENTCOM
2010
IEEE
13 years 5 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
« Prev « First page 1710 / 1728 Last » Next »