Sciweavers

1158 search results - page 211 / 232
» Mobile object tracking in wireless sensor networks
Sort
View
ICDCS
2009
IEEE
14 years 4 months ago
The Digital Marauder's Map: A New Threat to Location Privacy
“The Marauder’s Map” is a magical map in J. K. Rowling’s fantasy series, “Harry Potter and the Prisoner of Azkaban”. It shows all moving objects within the “Hogwarts...
Xinwen Fu, Nan Zhang 0004, Aniket Pingley, Wei Yu,...
CSFW
2000
IEEE
13 years 11 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
DSONLINE
2006
108views more  DSONLINE 2006»
13 years 7 months ago
Middleware for Protocol-Based Coordination in Mobile Applications
We propose extending these middleware approaches with suitable abstractions to better support protocolbased interaction in mobile applications. To test our approach, we created Obj...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
ERSA
2009
147views Hardware» more  ERSA 2009»
13 years 5 months ago
Fault Avoidance in Medium-Grain Reconfigurable Hardware Architectures
Medium-grain reconfigurable hardware (MGRH) architectures represent a hybrid between the versatility of a field programmable gate array (FPGA) and the computational power of a cust...
Kylan Robinson, José G. Delgado-Frias