Sciweavers

644 search results - page 106 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
NCA
2005
IEEE
15 years 5 months ago
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements
Context-aware applications rely on the ability to perceive the state of the surrounding environment. In this paper, we address a class of such applications where real-time guarant...
Malika Boulkenafed, Barbara Hughes, René Me...
CSREASAM
2008
15 years 1 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
ICNP
1998
IEEE
15 years 4 months ago
On-Demand Multicast in Mobile Wireless Networks
In this paper we propose an "on demand" multicast routing protocol for a wireless, mobile, multihop network. The proposed scheme has two key features: (a) it is based on...
Ching-Chuan Chiang, Mario Gerla
SENSYS
2003
ACM
15 years 5 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
DEBS
2010
ACM
15 years 3 months ago
Quilt: a patchwork of multicast regions
Network bottlenecks, firewalls, restrictions on IP Multicast availability and administrative policies have long prevented the use of multicast even where the fit seems obvious. ...
Qi Huang, Ymir Vigfusson, Ken Birman, Haoyuan Li