Sciweavers

249 search results - page 49 / 50
» Security Issues in Wireless Mesh Networks
Sort
View
EGC
2005
Springer
13 years 10 months ago
Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments
Currently, access to Grid services is limited to resourceful devices such as desktop PCs but most mobile devices (with wireless network connections) cannot access the Grid network ...
Hassan Jameel, Umar Kalim, Ali Sajjad, Sungyoung L...
TDSC
2010
101views more  TDSC 2010»
12 years 12 months ago
Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense o...
Mi Kyung Han, Lili Qiu
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 5 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
MOBISYS
2008
ACM
14 years 4 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
EMSOFT
2005
Springer
13 years 10 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander