Sciweavers

2478 search results - page 305 / 496
» Message from the Chair
Sort
View
ICDCS
2007
IEEE
15 years 10 months ago
Temporal Privacy in Wireless Sensor Networks
Although the content of sensor messages describing “events of interest” may be encrypted to provide confidentiality, the context surrounding these events may also be sensitiv...
Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong ...
P2P
2007
IEEE
15 years 10 months ago
PEPINO: PEer-to-Peer network INspectOr
PEPINO is a simple and effective peer-to-peer network inspector. It visualises not only meaningful pointers and connections between peers, but also the exchange of messages betwee...
Donatien Grolaux, Boris Mejías, Peter Van R...
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
15 years 10 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
EUROPAR
2007
Springer
15 years 10 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
LADS
2007
Springer
15 years 10 months ago
Adjusting a Knowledge-Based Algorithm for Multi-agent Communication for CPS
Abstract. Using a knowledge-based approach we adjust a knowledgebased algorithm for multi-agent communication for the process of cooperative problem solving (CPS). The knowledge-ba...
Egon van Baars, Rineke Verbrugge