Sciweavers

547 search results - page 105 / 110
» Analysis of a mobile communication security protocol
Sort
View
ADC
2007
Springer
145views Database» more  ADC 2007»
15 years 3 months ago
The Privacy of k-NN Retrieval for Horizontal Partitioned Data -- New Methods and Applications
Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retr...
Artak Amirbekyan, Vladimir Estivill-Castro
ICSE
2008
IEEE-ACM
15 years 10 months ago
Time-bounded adaptation for automotive system software
Software is increasingly deployed in vehicles as demand for new functionality increases and cheaper and more powerful hardware becomes available. Likewise, emerging wireless commu...
Aline Senart, Douglas C. Schmidt, Serena Fritsch, ...
80
Voted
CDVE
2007
Springer
137views Visualization» more  CDVE 2007»
15 years 3 months ago
A Virtual Interactive Community Platform Supporting Education for Long-Term Sick Children
Analysis of existing ICT-based solutions for the education of long-term ill children reveal several weaknesses with respect to social and cooperative involvement, cost of developme...
Pieter Jorissen, Fabian Di Fiore, Gert Vansichem, ...
JPDC
2007
191views more  JPDC 2007»
14 years 9 months ago
Clustering wireless ad hoc networks with weakly connected dominating set
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports selfconfiguration and self-management. Efficient clus...
Bo Han, Weijia Jia
INFOCOM
2010
IEEE
14 years 8 months ago
Multihop Transmission Opportunity in Wireless Multihop Networks
—Wireless multihop communication is becoming more important due to the increasing popularity of wireless sensor networks, wireless mesh networks, and mobile social networks. They...
Chansu Yu, Tianning Shen, Kang G. Shin, Jeong-Yoon...