Sciweavers

6137 search results - page 1140 / 1228
» Securing Collaborative Applications
Sort
View
SENSYS
2003
ACM
14 years 2 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
WMASH
2003
ACM
14 years 2 months ago
Wireless hotspots: current challenges and future directions
In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users an...
Anand Balachandran, Geoffrey M. Voelker, Paramvir ...
WSNA
2003
ACM
14 years 2 months ago
MANTIS: system support for multimodAl NeTworks of in-situ sensors
The MANTIS MultimodAl system for NeTworks of In-situ wireless Sensors provides a new multithreaded embedded operating system integrated with a general-purpose single-board hardwar...
Hector Abrach, Shah Bhatti, James Carlson, Hui Dai...
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
14 years 2 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai
AUSAI
2003
Springer
14 years 2 months ago
Towards Automated Creation of Image Interpretation Systems
Abstract. Automated image interpretation is an important task in numerous applications ranging from security systems to natural resource inventorization based on remote-sensing. Re...
Ilya Levner, Vadim Bulitko, Lihong Li, Greg Lee, R...
« Prev « First page 1140 / 1228 Last » Next »