Sciweavers

947 search results - page 87 / 190
» Information Security in Mobile Databases
Sort
View
126
Voted
BTW
2007
Springer
106views Database» more  BTW 2007»
15 years 10 months ago
Context-Based Data Tailoring for Mobile Users
: Independent, heterogeneous, distributed, sometimes transient and mobile data sources produce an enormous amount of information that should be semantically integrated and filtere...
Letizia Tanca
102
Voted
PERCOM
2005
ACM
16 years 3 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
143
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks
Mobile ad-hoc networks with their arbitrary topologies are a difficult domain for providing highly available Web services. Since hosts can move unpredictably, finding services a...
Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustd...
127
Voted
AGENTS
2000
Springer
15 years 7 months ago
A game-theoretic formulation of multi-agent resource allocation
This paper considers resource allocation in a network with mobile agents competing for computational priority. We formulate this problem as a multi-agent game with the players bei...
Jonathan Bredin, Rajiv T. Maheswaran, Çagri...
141
Voted
JUCS
2006
86views more  JUCS 2006»
15 years 3 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...