Sciweavers

804 search results - page 72 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ICAS
2005
IEEE
111views Robotics» more  ICAS 2005»
15 years 10 months ago
COOP - A cooperative caching service in MANETs
Data access applications in Mobile Ad Hoc Networks (MANETs) suffer from intermittent network connections and restricted power supplies. While most of the researches focus on Media...
Yu Du, Sandeep K. S. Gupta
126
Voted
ICWS
2009
IEEE
16 years 1 months ago
Service Supervision: Coordinating Web Services in Open Environment
ite Web service designed based on abstract Web services, which define only interfaces, allows an application developer to select services required for his application only by set...
Masahiro Tanaka, Toru Ishida, Yohei Murakami, Sato...
INFOCOM
2003
IEEE
15 years 10 months ago
Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach
—Wireless communications using ad hoc networks are receiving an increasing interest. The most attractive feature of ad hoc networks is the flexibility. The network is set up by ...
Peter Värbrand, Di Yuan, Patrik Björklun...
SACMAT
2011
ACM
14 years 7 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
ECSCW
1997
15 years 6 months ago
Aether: An Awareness Engine for CSCW
: Extending and reinterpreting earlier work on the 'Spatial Model', this paper presents a generic model for supporting awareness in cooperative systems ('the AETHER ...
Ovidiu Sandor, Cristian Bogdan, John Bowers