Sciweavers

646 search results - page 69 / 130
» Sharing multiple messages over mobile networks
Sort
View
FSTTCS
2003
Springer
14 years 2 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
ICDE
2007
IEEE
182views Database» more  ICDE 2007»
14 years 10 months ago
DIKNN: An Itinerary-based KNN Query Processing Algorithm for Mobile Sensor Networks
Current approaches to K Nearest Neighbor (KNN) search in mobile sensor networks require certain kind of indexing support. This index could be either a centralized spatial index or...
Shan-Hung Wu, Kun-Ta Chuang, Chung-Min Chen, Ming-...
WWW
2008
ACM
14 years 9 months ago
Yes, there is a correlation: - from social networks to personal behavior on the web
Characterizing the relationship that exists between a person's social group and his/her personal behavior has been a long standing goal of social network analysts. In this pa...
Parag Singla, Matthew Richardson
OPODIS
2003
13 years 10 months ago
A Peer-to-Peer Approach to Enhance Middleware Connectivity
One of the problems of middleware for shared state is that they are designed, explicitly or implicitly, for symmetric networks. However, since the Internet is not symmetric, end-to...
Erik Klintskog, Valentin Mesaros, Zacharias El Ban...
FSR
2003
Springer
251views Robotics» more  FSR 2003»
14 years 2 months ago
Distributed Search and Rescue with Robot and Sensor Teams
We develop a network of distributed mobile sensor systems as a solution to the emergency response problem. The mobile sensors are inside a building and they form a connected ad-ho...
George Kantor, Sanjiv Singh, Ronald A. Peterson, D...