Sciweavers

51 search results - page 2 / 11
» euc 2005
Sort
View
EUC
2005
Springer
13 years 10 months ago
A Survey of Anonymous Peer-to-Peer File-Sharing
Abstract. This paper provides a survey of searchable, peer-to-peer filesharing systems that offer the user some form of anonymity. We start this survey by giving a brief descript...
Tom Chothia, Konstantinos Chatzikokolakis
EUC
2005
Springer
13 years 10 months ago
Object Tracking Using Durative Events
This paper presents a distributed middleware architecture based on a service-oriented approach, to manage high volume sensor events. Event management takes a multi-step operation f...
Eiko Yoneki, Jean Bacon
EUC
2005
Springer
13 years 10 months ago
Wireless RFID Networks for Real-Time Customer Relationship Management
A new system for real-time customer relationship management is proposed. The system is based on deploying a network of RFID readers throughout an environment. Information about the...
C. Philipp Schloter, Hamid K. Aghajan
EUC
2005
Springer
13 years 10 months ago
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capa...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
EUC
2005
Springer
13 years 10 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...