Sciweavers

483 search results - page 17 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
AISS
2010
107views more  AISS 2010»
14 years 6 months ago
A Practical Method of Reducing the Gaps in e-Government Interoperability Implementation: Case of Patient Referral Information Ex
In recent years, e-government interoperability frameworks (e-GIFs) and enterprise architectures (EAs) have been extensively developed as mechanism tools for achieving the interope...
Apitep Saekow, Choompol Boonmee
91
Voted
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 2 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
SOSP
2001
ACM
15 years 6 months ago
BASE: Using Abstraction to Improve Fault Tolerance
ing Abstraction to Improve Fault Tolerance MIGUEL CASTRO Microsoft Research and RODRIGO RODRIGUES and BARBARA LISKOV MIT Laboratory for Computer Science Software errors are a major...
Rodrigo Rodrigues, Miguel Castro, Barbara Liskov
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
15 years 9 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
SIGCOMM
2010
ACM
14 years 9 months ago
Design and implementation of an "approximate" communication system for wireless media applications
All practical wireless communication systems are prone to errors. At the symbol level such wireless errors have a well-defined structure: when a receiver decodes a symbol erroneou...
Sayandeep Sen, Syed Gilani, Shreesha Srinath, Step...