Sciweavers

2061 search results - page 350 / 413
» Authorization for Metacomputing Applications
Sort
View
109
Voted
MOBIHOC
2005
ACM
16 years 4 days ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
89
Voted
DCC
2007
IEEE
16 years 4 days ago
On Compression of Encrypted Video
We consider video sequences that have been encrypted uncompressed. Since encryption masks the source, traditional data compression algorithms are rendered ineffective. However, it...
Daniel Schonberg, Chuohao Yeo, Stark C. Draper, Ka...
88
Voted
MOBIHOC
2003
ACM
16 years 4 days ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
87
Voted
ECIR
2009
Springer
15 years 9 months ago
Word Particles Applied to Information Retrieval
Document retrieval systems conventionally use words as the basic unit of representation, a natural choice since words are primary carriers of semantic information. In this paper w...
Evandro B. Gouvêa, Bhiksha Raj
EUROSYS
2007
ACM
15 years 9 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso