Sciweavers

804 search results - page 76 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
GI
2004
Springer
15 years 10 months ago
An Architecture Concept for Mobile P2P File Sharing Services
Abstract: File-sharing in mobile networks has differing demands to a P2P architecture. Resource access and mediation techniques must follow constraints given in 2.5G/3G networks. E...
Frank-Uwe Andersen, Hermann de Meer, Ivan Dedinski...
ICC
2008
IEEE
162views Communications» more  ICC 2008»
15 years 11 months ago
Distributed Opportunistic Scheduling in Multihop Wireless Ad Hoc Networks
Abstract—In this paper, we introduce a framework for distributed opportunistic scheduling in multihop wireless ad hoc networks. With the proposed framework, one can take a schedu...
Yijiang Sun, Victor O. K. Li, Ka-Cheong Leung
PERVASIVE
2007
Springer
15 years 10 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...
HICSS
2006
IEEE
77views Biometrics» more  HICSS 2006»
15 years 10 months ago
System-Wide Replacement Strategy for Substation Protection and Automation Systems
The protection and control systems in the US utility industry are still primarily composed of electromechanical relays and systems. Over 80 percent of the relays are still electro...
Paul T. Myrda, Eric A. Udren
DCOSS
2010
Springer
15 years 8 months ago
Time-Critical Data Delivery in Wireless Sensor Networks
A number of wireless sensor network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmissi...
Petcharat Suriyachai, James Brown, Utz Roedig