Sciweavers

13007 search results - page 2379 / 2602
» Wireless and Mobile Networking
Sort
View
PERCOM
2009
ACM
14 years 10 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
CHI
2006
ACM
14 years 10 months ago
Broken expectations in the digital home
As part of an ongoing effort to understand ease of use of digital home technologies, we undertook an exploratory study of people who use their home networks for more than just bro...
Sara A. Bly, Bill N. Schilit, David W. McDonald, B...
PODS
2006
ACM
96views Database» more  PODS 2006»
14 years 9 months ago
Efficient gossip-based aggregate computation
Recently, there has been a growing interest in gossip-based protocols that employ randomized communication to ensure robust information dissemination. In this paper, we present a ...
Srinivas R. Kashyap, Supratim Deb, K. V. M. Naidu,...
PERCOM
2006
ACM
14 years 9 months ago
QoS Routing in OLSR with Several Classes of Service
The Optimized Link State Routing (OLSR) protocol is a proactive link-state protocol bafor ad-hoc networks. It uses an optimization called Multi-Point Relays (MPRs) to provide an e...
Jeremie Leguay, Timur Friedman
PERCOM
2006
ACM
14 years 9 months ago
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies
We consider group key agreement (GKA) protocols, used by a group of peers to establish a shared secret key for multicast communications. There has been much previous work to impro...
Ford-Long Wong, Frank Stajano
« Prev « First page 2379 / 2602 Last » Next »