Sciweavers

424 search results - page 42 / 85
» Requirements Prioritization Challenges in Practice
Sort
View
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
14 years 9 months ago
SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
In a mobile service scenario, users query a server for nearby points of interest but they may not want to disclose their locations to the service. Intuitively, location privacy may...
Man Lung Yiu, Christian S. Jensen, Xuegang Huang, ...
INFOCOM
2007
IEEE
14 years 2 months ago
Face Tracing Based Geographic Routing in Nonplanar Wireless Networks
— Scalable and efficient routing is a main challenge in the deployment of large ad hoc wireless networks. An essential element of practical routing protocols is their accommodat...
Fenghui Zhang, Hao Li, Anxiao Jiang, Jianer Chen, ...
ESAS
2004
Springer
14 years 1 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
EUNIS
2001
13 years 9 months ago
Management of Georgian Technical Universities Organization and Structure
: After the election of the Georgian Technical University in 1999 as a member of uropian Universities Association, the main accent was to improve economical and managerial educatio...
Alexandre Ediberidze, Ramaz Khurodze, Sh. Nachkebi...
USS
2010
13 years 5 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...