Sciweavers

4345 search results - page 837 / 869
» Temporal Constraint Networks
Sort
View
SBP
2012
Springer
12 years 3 months ago
Creating Interaction Environments: Defining a Two-Sided Market Model of the Development and Dominance of Platforms
Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
GI
2004
Springer
14 years 29 days ago
An Architecture Concept for Mobile P2P File Sharing Services
Abstract: File-sharing in mobile networks has differing demands to a P2P architecture. Resource access and mediation techniques must follow constraints given in 2.5G/3G networks. E...
Frank-Uwe Andersen, Hermann de Meer, Ivan Dedinski...
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 7 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi

Publication
172views
14 years 9 months ago
The Spatial Patterns Affecting Home to Work Distances of Two-Worker Households
Round-trips between home and work represent, for the majority of people, most of their daily commuting time; also, setting home and work places involves more constraints for two- ...
Surprenant-Legault, J and El-Geneidy A.
PERCOM
2005
ACM
14 years 7 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis