Sciweavers

62 search results - page 2 / 13
» icdcs 2008
Sort
View
ICDCS
2008
IEEE
13 years 11 months ago
How to Monitor for Missing RFID tags
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and effic...
Chiu Chiang Tan, Bo Sheng, Qun Li
ICDCS
2008
IEEE
13 years 11 months ago
Can We Really Recover Data if Storage Subsystem Fails?
This paper presents a theoretical and experimental study on the limitations of copy-on-write snapshots and incremental backups in terms of data recoverability. We provide mathemat...
Weijun Xiao, Qing Yang
ICDCS
2008
IEEE
13 years 11 months ago
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...
ICDCS
2008
IEEE
13 years 11 months ago
Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing Applications
Context-awareness allows pervasive applications to adapt to changeable computing environments. Contexts, the pieces of information that capture the characteristics of environments...
Chang Xu, Shing-Chi Cheung, Wing Kwong Chan, Chuny...
ICDCS
2008
IEEE
13 years 11 months ago
Distributed Connected Dominating Set Construction in Geometric k-Disk Graphs
In this paper, we study the problem of minimum connected dominating set in geometric k-disk graphs. This research is motivated by the problem of virtual backbone construction in w...
Kai Xing, Wei Cheng, E. K. Park, Shmuel Rotenstrei...