Sciweavers

304 search results - page 22 / 61
» Trusted Computing in Mobile Action
Sort
View
LCN
2008
IEEE
15 years 9 months ago
Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks
—Hyperbolic position bounding (HPB) provides a mechanism to probabilistically delimit the location of a wireless network malicious insider to a candidate area. A large scale path...
Christine Laurendeau, Michel Barbeau
PERCOM
2010
ACM
15 years 1 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
143
Voted
LANMR
2007
15 years 4 months ago
Planning using situation calculus, prolog and a mobile robot
This paper presents a system that controls the behavior of a mobile robot. The system is based on situation calculus, the initial state is described and a goal is given, Prolog pro...
Pilar Pozos Parra, Edgardo Yescas, Jacob Vá...
147
Voted
NOSSDAV
2009
Springer
15 years 10 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
IEEEARES
2007
IEEE
15 years 9 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli