Sciweavers

159 search results - page 26 / 32
» Secure Range Queries in Tiered Sensor Networks
Sort
View
ESAS
2007
Springer
14 years 1 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...
TMC
2011
1105views more  TMC 2011»
13 years 2 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
EUROSYS
2006
ACM
14 years 4 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
TKDE
2010
197views more  TKDE 2010»
13 years 2 months ago
Filtering Data Streams for Entity-Based Continuous Queries
The idea of allowing query users to relax their correctness requirements in order to improve performance of a data stream management system (e.g., location-based services and senso...
Reynold Cheng, Benjamin C. M. Kao, Alan Kwan, Suni...
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 10 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang