Sciweavers

1010 search results - page 116 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
MHCI
2005
Springer
15 years 5 months ago
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. ‘FarCry’ uses the mobility of users to carry files between separated networks. Throu...
Paul Tennent, Malcolm Hall, Barry Brown, Matthew C...
HPDC
2000
IEEE
15 years 4 months ago
Managing Network Resources in Condor
Data-intensive applications in the Condor High Throughput Computing environment can place heavy demands on network resources for checkpointing and remote data access. We have deve...
Jim Basney, Miron Livny
FTDCS
2003
IEEE
15 years 5 months ago
Autonomous Transaction Processing Using Data Dependency in Mobile Environments
Mobile clients retrieve and update databases at servers. They use transactions in order to ensure the consistency of shared data in the presence of concurrent accesses. Transactio...
IlYoung Chung, Bharat K. Bhargava, Malika Mahoui, ...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 6 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
WCNC
2008
IEEE
15 years 6 months ago
Neural Network-Based Approach for Adaptive Density Control and Reliability in Wireless Sensor Networks
A primary constraint in wireless sensor networks (WSNs) is obtaining reliable and prolonged network operation with power-limited sensor nodes. Most of the approaches to the energy ...
Renita Machado, Sirin Tekinay