Sciweavers

433 search results - page 83 / 87
» An Overview of the VigilNet Architecture
Sort
View
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 5 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
VTC
2006
IEEE
203views Communications» more  VTC 2006»
15 years 5 months ago
The 3G Long-Term Evolution - Radio Interface Concepts and Performance Evaluation
Abstract—3GPP is in the process of defining the long-term evolution (LTE) for 3G radio access, sometimes referred to as Super3G, in order to maintain the future competitiveness o...
Erik Dahlman, Hannes Ekström, Anders Furuskar...
ACMSE
2006
ACM
15 years 5 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
ISORC
2005
IEEE
15 years 5 months ago
Heterogeneous Adaptive Component-Based Applications with Adaptive.Net
Adaptation to changing environmental conditions is a major challenge for most distributed applications. The service-oriented programming paradigm leads to an increasing number of ...
Andreas Rasche, Marco Puhlmann, Andreas Polze
CLEF
2005
Springer
15 years 5 months ago
20th Century Esfinge (Sphinx) Solving the Riddles at CLEF 2005
Abstract. Esfinge is a general domain Portuguese question answering system. It tries to apply simple techniques to large amounts of text. Esfinge participated last year in the mono...
Luís Costa