Sciweavers

1172 search results - page 83 / 235
» MIPv6 experimental evaluation using overlay networks
Sort
View
CCGRID
2005
IEEE
14 years 2 months ago
Performance evaluation of JXTA communication layers
— The arrival of the P2P model has opened many new avenues for research within the field of distributed computing. This is mainly due to important practical features (such as su...
Gabriel Antoniu, Philip J. Hatcher, Mathieu Jan, D...
SENSYS
2010
ACM
13 years 7 months ago
Estimating building consumption breakdowns using ON/OFF state sensing and incremental sub-meter deployment
This paper considers the problem of estimating the power breakdowns for the main appliances inside a building using a small number of power meters and the knowledge of the ON/OFF ...
Deokwoo Jung, Andreas Savvides
MOBISYS
2011
ACM
12 years 12 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
PERCOM
2010
ACM
13 years 7 months ago
PerFallD: A pervasive fall detection system using mobile phones
Falls are a major health risk that diminish the quality of life among elderly people. With the elderly population surging, especially with aging "baby boomers", fall dete...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
CCS
2006
ACM
14 years 25 days ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh