Sciweavers

173 search results - page 28 / 35
» Providing a Progressive Access to Awareness Information
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
ISEM
2006
112views more  ISEM 2006»
13 years 7 months ago
Ubiquitous computing: connecting Pervasive computing through Semantic Web
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deal...
Sachin Singh, Sushil Puradkar, Yugyung Lee
EFDBS
2000
13 years 9 months ago
Citation Linking in Federated Digital Libraries
Today, bibliographical information is kept in a variety of data sources world wide, some of them publically available, and some of them also offering information about citations m...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler
TRIDENTCOM
2010
IEEE
13 years 5 months ago
QoE Testbed Infrastructure and Services: Enriching the End User's Experience
Quality of Experience (QoE) is the subjective judgment of the satisfaction an end user perceives from an application running over a given network topology and configuration. The in...
Frances Cleary Grant, Eileen Dillon, Gemma Power, ...
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers