Sciweavers

2199 search results - page 439 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
OTM
2007
Springer
13 years 10 months ago
A Multi-party Rational Exchange Protocol
In recent years, existing computing schemes and paradigms have evolved towards more flexible, ad-hoc scalable frameworks. Nowadays, exchanging interactions between entities often ...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
RAID
2004
Springer
13 years 10 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
13 years 9 months ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
ICRA
2000
IEEE
165views Robotics» more  ICRA 2000»
13 years 9 months ago
An Approach to Rapid Manufacturing with Custom Fixturing
We present an approach for automatically generating complete process plans, including xturing and CNC code, from high level shape feature part descriptions. The demonstration syst...
Mark Bloomenthal, Richard F. Riesenfeld, Elaine Co...
WICON
2008
13 years 6 months ago
Towards distributed network classification for mobile ad hoc networks
Mobile ad hoc networks range from traditional MANETs where end-to-end paths exist from sources to destinations, to DTNs where no contemporaneous end-to-end paths exist and communi...
Dimitrios Antonellis, Ahmed Mansy, Konstantinos Ps...