Sciweavers

644 search results - page 117 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
ISPA
2005
Springer
15 years 3 months ago
Next Generation Networks Architecture and Layered End-to-End QoS Control
Next-generation network (NGN) is a new concept and becoming more and more important for future telecommunication networks. This paper illustrates five function layers of NGN archit...
Weijia Jia, Bo Han, Ji Shen, Haohuan Fu
76
Voted
ADC
2007
Springer
145views Database» more  ADC 2007»
15 years 3 months ago
The Privacy of k-NN Retrieval for Horizontal Partitioned Data -- New Methods and Applications
Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retr...
Artak Amirbekyan, Vladimir Estivill-Castro
87
Voted
CSCWD
2005
Springer
14 years 11 months ago
BW-M: a framework for awareness support in Web-based groupware systems
In this paper, we present a framework for contextbased awareness support designed for web-based groupware systems. Nowadays, such systems can be accessed through web-enabled mobil...
Manuele Kirsch-Pinheiro, Marlène Villanova-...
CCS
2009
ACM
15 years 4 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
ACSC
2008
IEEE
15 years 4 months ago
HOVER: hybrid on-demand distance vector routing for wireless mesh networks
Abstract— Hybrid Wireless Mesh Networks are a combination of mobile ad hoc networks and infrastructure wireless mesh networks, consisting of two types of nodes: Mobile Mesh Clien...
Stephan Mir, Asad Amir Pirzada, Marius Portmann