Sciweavers

947 search results - page 152 / 190
» Information Security in Mobile Databases
Sort
View
KDD
2010
ACM
208views Data Mining» more  KDD 2010»
13 years 9 months ago
Towards mobility-based clustering
Identifying hot spots of moving vehicles in an urban area is essential to many smart city applications. The practical research on hot spots in smart city presents many unique feat...
Siyuan Liu, Yunhuai Liu, Lionel M. Ni, Jianping Fa...
POLICY
2007
Springer
14 years 5 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...
ICDCSW
2002
IEEE
14 years 3 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
AGENTS
1997
Springer
14 years 3 months ago
Agent-Based Expert Assistance for Visual Problem Solving
This paper presents a domain-independent architecture for facilitating visual problem solving between robots or softbots and humans. The architecture de nes virtual and human agen...
Erika Rogers, Robin R. Murphy, Barb Ericson
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 11 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh