Sciweavers

213 search results - page 35 / 43
» New Message Difference for MD4
Sort
View
TPDS
2008
176views more  TPDS 2008»
13 years 7 months ago
Adaptive Data Collection Strategies for Lifetime-Constrained Wireless Sensor Networks
Communication is a primary source of energy consumption in wireless sensor networks. Due to resource constraints, the sensor nodes may not have enough energy to report every readin...
Xueyan Tang, Jianliang Xu
SAC
2008
ACM
13 years 7 months ago
Towards a complete SCM ontology: the case of ontologising RosettaNet
This paper presents a methodology to derive a Supply Chain Management Ontology based on the RosettaNet specification framework. A prototype to mechanically derive a core ontology ...
Armin Haller, Jedrzej Gontarczyk, Paavo Kotinurmi
IJISTA
2010
109views more  IJISTA 2010»
13 years 6 months ago
BKCAS: a distributed context-aware pervasive information system to support user roaming
- Over the last few years, Pervasive Computing has become a very active research topic in both academia and industry. In spite of its undeniable benefit, until recently, the wide d...
Nguyen Chan Hung, Vu Thanh Vinh, Nguyen Huu Thang,...
TMC
2010
134views more  TMC 2010»
13 years 5 months ago
Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks
—Wireless mesh networks are a promising area for the deployment of new wireless communication and networking technologies. In this paper, we address the problem of enabling effec...
Claudia Canali, Maria Elena Renda, Paolo Santi, Si...
IH
2010
Springer
13 years 5 months ago
The Reverse Statistical Disclosure Attack
Abstract. Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on f...
Nayantara Mallesh, Matthew K. Wright