Sciweavers

2507 search results - page 297 / 502
» Wireless Network Information Flow
Sort
View
112
Voted
ESORICS
2009
Springer
15 years 10 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 10 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
161
Voted
NCA
2005
IEEE
15 years 9 months ago
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements
Context-aware applications rely on the ability to perceive the state of the surrounding environment. In this paper, we address a class of such applications where real-time guarant...
Malika Boulkenafed, Barbara Hughes, René Me...
MMMACNS
2005
Springer
15 years 9 months ago
Self-managed Cells for Ubiquitous Systems
Abstract. Amongst the challenges of ubiquitous computing is the need to provide management support for personal wireless devices and sensors. In this extended abstract we introduce...
Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe S...
135
Voted
TWC
2010
14 years 10 months ago
Cooperative Transmission Protocols for Wireless Broadcast Channels
In this paper, cooperative transmission protocols are proposed for wireless broadcast channels, a fundamental building block of wireless communication networks. The concepts of co...
Zhiguo Ding, Kin K. Leung, Dennis Goeckel, Donald ...