Sciweavers

3031 search results - page 457 / 607
» Reuse in the application layer
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
IPPS
2005
IEEE
15 years 9 months ago
MOCCA - Towards a Distributed CCA Framework for Metacomputing
— We describe the design and implementation of MOCCA, a distributed CCA framework implemented using the H2O metacomputing system. Motivated by the quest for appropriate metasyste...
Maciej Malawski, Dawid Kurzyniec, Vaidy S. Sundera...
129
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Personal AP Protocol for Mobility Management in IEEE 802.11 Systems
—In mobile wireless systems, the quest to support delay-stringent multimedia applications challenges most existing solutions to the mobility support and traffic management proble...
Lei Zan, Jidong Wang, Lichun Bao
IH
2005
Springer
15 years 9 months ago
ID Modulation: Embedding Sensor Data in an RFID Timeseries
This paper reports the first use of ID Modulation to embed a bitstream representing sensor information in a standards-compliant Radio Frequency Identification (RFID) channel. Like ...
Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Ph...
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
15 years 9 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal