Sciweavers

745 search results - page 148 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
TON
2008
108views more  TON 2008»
13 years 4 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
EMNETS
2007
13 years 9 months ago
Image browsing, processing, and clustering for participatory sensing: lessons from a DietSense prototype
Imagers are an increasingly significant source of sensory observations about human activity and the urban environment. ImageScape is a software tool for processing, clustering, an...
Sasank Reddy, Andrew Parker, Josh Hyman, Jeff Burk...
SAC
2006
ACM
13 years 11 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
PDPTA
2003
13 years 6 months ago
Tuxedo: A Peer-to-Peer Caching System
We are witnessing two trends in Web content access: (a) increasing amounts of dynamic and personalized Web content, and (b) a significant growth in “on-the-move” access using...
Weisong Shi, Kandarp Shah, Yonggen Mao, Vipin Chau...
WWW
2003
ACM
14 years 5 months ago
Bridging the P2P and WWW Divide with DISCOVIR - DIStributed COntent-based Visual Information Retrieval
In the light of image retrieval evolving from text annotation to content-based and from standalone applications to web-based search engines, we foresee the need for deploying cont...
Ka Cheung Sia, Cheuk Hang Ng, Chi-Hang Chan