Sciweavers

3181 search results - page 360 / 637
» Automated Deployment Support for Parallel Distributed Comput...
Sort
View
ICDCS
2007
IEEE
15 years 10 months ago
Temporal Privacy in Wireless Sensor Networks
Although the content of sensor messages describing “events of interest” may be encrypted to provide confidentiality, the context surrounding these events may also be sensitiv...
Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong ...
IPPS
2007
IEEE
15 years 10 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
IPPS
2007
IEEE
15 years 10 months ago
Scalable, Dynamic Analysis and Visualization for Genomic Datasets
A challenge in data analysis and visualization is to build new-generation software tools and systems to truly accelerate scientific discoveries. The recent focus of Princeton’s ...
Grant Wallace, Matthew A. Hibbs, Maitreya J. Dunha...
IPPS
2007
IEEE
15 years 10 months ago
Locality-Aware Consistency Maintenance for Heterogeneous P2P Systems
Replication and caching have been deployed widely in current P2P systems. In update-allowed P2P systems, a consistency maintenance mechanism is strongly demanded. Several solution...
Zhenyu Li, Gaogang Xie, Zhongcheng Li
HPCC
2007
Springer
15 years 10 months ago
DISH - Dynamic Information-Based Scalable Hashing on a Cluster of Web Cache Servers
Caching web pages is an important part of web infrastructure. The effects of caching services are even more pronounced for wireless infrastructures due to their limited bandwidth. ...
Andrew Sohn, Hukeun Kwak, Kyusik Chung