Sciweavers

563 search results - page 98 / 113
» Verifiable Signature Sharing
Sort
View
UIC
2010
Springer
13 years 7 months ago
A Middleware for Intelligent Environments and the Internet of Things
Interdisciplinary research from the domains of pervasive computing or ubiquitous computing, computer-human-interaction and computer science has led to the development of many intel...
Luis Roalter, Matthias Kranz, Andreas Möller
DOLAP
2010
ACM
13 years 6 months ago
Using ontologies to discover fact IDs
Object identification is a crucial step in most information systems. Nowadays, we have many different ways to identify entities such as surrogates, keys and object identifiers. Ho...
Alberto Abelló, Oscar Romero
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 3 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
PPNA
2011
13 years 3 months ago
Evaluation framework for adaptive context-aware routing in large scale mobile peer-to-peer systems
The proliferation of novel wireless network technologies creates new opportunities for complex peerto-peer information dissemination systems. A key challenge that remains in this a...
Ansar-Ul-Haque Yasar, Davy Preuveneers, Yolande Be...
PROMISE
2010
13 years 3 months ago
Replication of defect prediction studies: problems, pitfalls and recommendations
Background: The main goal of the PROMISE repository is to enable reproducible, and thus verifiable or refutable research. Over time, plenty of data sets became available, especial...
Thilo Mende