Sciweavers

1677 search results - page 284 / 336
» A distributed security scheme for ad hoc networks
Sort
View
CCS
2009
ACM
15 years 4 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
WWW
2004
ACM
15 years 10 months ago
Pride: peer-to-peer reputation infrastructure for decentralized environments
Peer-to-peer (P2P) networks use the fundamental assumption that the nodes in the network will cooperate and will not cheat. In the absence of any common goals shared by the nodes ...
Prashant Dewan, Partha Dasgupta
FTDCS
2003
IEEE
15 years 3 months ago
Looking for a Common View for Mobile Worlds
This paper considers central issues of distributed computing in a mobile environment. Its aim is to light on the first brick of a common view for mobile systems. We pool together...
Maria Gradinariu, Michel Raynal, Gwendal Simon
PERCOM
2005
ACM
15 years 9 months ago
Re-Conceptualizing Learning Environments: A Framework for Pervasive eLearning
Pervasive eLearning requires a novel media perspective on learning objects. Instead of viewing handhelds or smart phones as minimized PCs we would like to propose a perspective on...
Reinhard Keil-Slawik, Thorsten Hampel, Bernd E&szl...
COORDINATION
2008
Springer
14 years 11 months ago
CiAN: A Workflow Engine for MANETs
Most mature workflow management systems (WfMSs) available today execute workflows via orchestration of an available set of services, a process in which a central coordinating enti...
Rohan Sen, Gruia-Catalin Roman, Christopher D. Gil...