Sciweavers

282 search results - page 50 / 57
» Private Policy Negotiation
Sort
View
MOBISYS
2003
ACM
14 years 7 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
GLOBECOM
2008
IEEE
14 years 1 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
IPPS
2008
IEEE
14 years 1 months ago
Enabling personal clusters on demand for batch resources using commodity software
Providing QoS (Quality of Service) in batch resources against the uncertainty of resource availability due to the space-sharing nature of scheduling policies is a critical capabil...
Yang-Suk Kee, Carl Kesselman, Daniel Nurmi, Richar...
ACMMSP
2006
ACM
247views Hardware» more  ACMMSP 2006»
14 years 1 months ago
A flexible data to L2 cache mapping approach for future multicore processors
This paper proposes and studies a distributed L2 cache management approach through page-level data to cache slice mapping in a future processor chip comprising many cores. L2 cach...
Lei Jin, Hyunjin Lee, Sangyeun Cho
ATAL
2005
Springer
14 years 27 days ago
OWL-P: OWL for protocol and processes
We describe OWL-P (OWL for Processes and Protocols), a methodology and software tool for specifying and enacting interaction protocols among autonomous agents. We use the Web Onto...
Ashok U. Mallya, Nirmit Desai, Amit K. Chopra, Mun...