Sciweavers

1597 search results - page 95 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
ESAS
2007
Springer
14 years 4 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
MOBISYS
2008
ACM
14 years 29 days ago
Community sensor grids: virtualization for sharing across domains
Wireless sensor networks have been traditionally designed to be privately owned and used. Hence the two hallmark features of sensor networks, namely customized network application...
Amiya Bhattacharya, Meddage S. Fernando, Partha Da...
NETWORK
2006
186views more  NETWORK 2006»
13 years 10 months ago
Multiuser cross-layer resource allocation for video transmission over wireless networks
With the advancement of video-compression technology and the wide deployment of wireless networks, there is an increasing demand for wireless video communication services, and man...
Guan-Ming Su, Zhu Han, Min Wu, K. J. Ray Liu
MKWI
2008
168views Business» more  MKWI 2008»
14 years 2 days ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
DBISP2P
2004
Springer
95views Database» more  DBISP2P 2004»
14 years 4 months ago
Data Management in Mobile Peer-to-Peer Networks
Abstract. In this paper we examine the database management of spatiotemporal resource information in mobile peer-to-peer networks, where moving objects communicate with each other ...
Bo Xu, Ouri Wolfson