Sciweavers

50 search results - page 3 / 10
» icumt 2009
Sort
View
ICUMT
2009
13 years 7 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio
ICUMT
2009
13 years 7 months ago
An efficient solution for max-min fair rate allocation in P2P simulation
Abstract--With the rapid development of peer-to-peer networks, simulation is considered as a useful tool to demonstrate initial ideas before building prototypes with real network t...
Anh Tuan Nguyen, Frank Eliassen
ICUMT
2009
13 years 7 months ago
SBCL - improved centroid estimation
Localization of sensor nodes is one of the key issues in Wireless Sensor Networks. It is a precondition for a variety of applications, as well as geographic clustering and routing....
Ralf Behnke, Jakob Salzmann, Dirk Timmermann
ICUMT
2009
13 years 7 months ago
Extending middleware frameworks for Wireless Sensor Networks
We define sensor middleware as the binding code mainly running between the sensor OS and applications g programming abstractions to bridge the gap between application developers an...
Syed Rehan Afzal, Christophe Huygens, Wouter Joose...
ICUMT
2009
13 years 7 months ago
Coordinate-based routing: Refining nodeIds in structured peer-to-peer systems
Structured peer-to-peer systems--also known as key-based routing protocols--offer a base for a broad range of applications. In the past, different topology adaptation mechanisms fo...
Fabian Hartmann, Bernhard Heep