Sciweavers

563 search results - page 98 / 113
» Verifiable Signature Sharing
Sort
View
163
Voted
UIC
2010
Springer
15 years 1 months ago
A Middleware for Intelligent Environments and the Internet of Things
Interdisciplinary research from the domains of pervasive computing or ubiquitous computing, computer-human-interaction and computer science has led to the development of many intel...
Luis Roalter, Matthias Kranz, Andreas Möller
131
Voted
DOLAP
2010
ACM
15 years 27 days ago
Using ontologies to discover fact IDs
Object identification is a crucial step in most information systems. Nowadays, we have many different ways to identify entities such as surrogates, keys and object identifiers. Ho...
Alberto Abelló, Oscar Romero
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 10 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
146
Voted
PPNA
2011
14 years 10 months ago
Evaluation framework for adaptive context-aware routing in large scale mobile peer-to-peer systems
The proliferation of novel wireless network technologies creates new opportunities for complex peerto-peer information dissemination systems. A key challenge that remains in this a...
Ansar-Ul-Haque Yasar, Davy Preuveneers, Yolande Be...
181
Voted
PROMISE
2010
14 years 10 months ago
Replication of defect prediction studies: problems, pitfalls and recommendations
Background: The main goal of the PROMISE repository is to enable reproducible, and thus verifiable or refutable research. Over time, plenty of data sets became available, especial...
Thilo Mende