Sciweavers

2927 search results - page 144 / 586
» Secure Distributed Human Computation
Sort
View
CONEXT
2008
ACM
13 years 11 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
SAC
2002
ACM
13 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
SP
2002
IEEE
147views Security Privacy» more  SP 2002»
13 years 9 months ago
CX: A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks...
Peter R. Cappello, Dimitros Mourloukos
ICN
2001
Springer
14 years 2 months ago
Secure Communication: A New Application for Active Networks
SplitPath is a new application for the easy, well-known and provably secure one-time pad encryption scheme. Two problems hinder the one-time pad scheme from being applied in the ar...
Manuel Günter, Marc Brogle, Torsten Braun
EUSAI
2003
Springer
14 years 2 months ago
Multi-sensor Activity Context Detection for Wearable Computing
For wearable computing applications, human activity is a central part of the user’s context. In order to avoid user annoyance it should be acquired automatically using body-worn ...
Nicky Kern, Bernt Schiele, Albrecht Schmidt