Sciweavers

623 search results - page 90 / 125
» The role of trust in distributed design
Sort
View
TMC
2011
1105views more  TMC 2011»
13 years 2 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
PERCOM
2007
ACM
14 years 7 months ago
XCML: A Runtime Representation for the Context Modelling Language
The Context Modelling Language (CML), derived from Object Role Modeling (ORM), is a powerful approach for capturing the pertinent object types and relationships between those type...
Ricky Robinson, Karen Henricksen, Jadwiga Indulska
SAC
2009
ACM
14 years 2 months ago
Geographical data collection in sensor networks with self-organizing transaction cluster-heads
This paper proposes 2G, a flexible and energy-efficient data collection protocol for sensor networks for increasing network lifetime. To this end, it integrates self-organizing d...
Neeraj Rajgure, Eric Platon, Cristian Borcea, Shin...
ICDCS
2008
IEEE
14 years 2 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
ICPP
2008
IEEE
14 years 2 months ago
Bridging the Gap Between Parallel File Systems and Local File Systems: A Case Study with PVFS
Parallel I/O plays an increasingly important role in today’s data intensive computing applications. While much attention has been paid to parallel read performance, most of this...
Peng Gu, Jun Wang, Robert Ross