Sciweavers

2691 search results - page 451 / 539
» Security in Ad Hoc Networks
Sort
View
PERCOM
2003
ACM
14 years 9 months ago
Mobile Link Services with MQSeries Everyplace
The Open Hypermedia model is based upon the separation of hypertext links from documents and treats them as separate entities. Distributed link services take this approach and imp...
Sanjay Vivek, Kenneth Tso, David De Roure
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 4 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
COMCOM
2008
153views more  COMCOM 2008»
13 years 10 months ago
A TTP-free protocol for location privacy in location-based services
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as c...
Agusti Solanas, Antoni Martínez-Ballest&eac...
PERCOM
2008
ACM
14 years 9 months ago
Non-anchored Unified Naming for Ubiquitous Computing Environments
Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
Yoo Chul Chung, Dongman Lee
ICDCSW
2006
IEEE
14 years 4 months ago
Contory: A Smart Phone Middleware Supporting Multiple Context Provisioning Strategies
This paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple...
Oriana Riva, Cristiano di Flora