Sciweavers

3276 search results - page 384 / 656
» Data Management for Pervasive Computing
Sort
View
81
Voted
NDSS
2005
IEEE
15 years 5 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
SAC
2005
ACM
15 years 5 months ago
Automatic wrapper maintenance for semi-structured web sources using results from previous queries
During the last years, significant attention has been paid to the problem of building wrappers for extracting data from semistructured web sources. Nevertheless, since web sources...
Juan Raposo, Alberto Pan, Manuel Álvarez, &...
103
Voted
WPES
2004
ACM
15 years 5 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
SI3D
1999
ACM
15 years 4 months ago
MMR: an interactive massive model rendering system using geometric and image-based acceleration
We present a system for rendering very complex 3D models at interactive rates. We select a subset of the model as preferred viewpoints and partition the space into virtual cells. ...
Daniel G. Aliaga, Jonathan D. Cohen, Andrew Wilson...
ICDCS
1999
IEEE
15 years 4 months ago
Beyond the Black Box: Event-based Inter-Process Communication in Process Support Systems
Existing workflow management systems encapsulate the data and behavior of a process within its execution scope, preventing other processes from accessing this information until th...
Claus Hagen, Gustavo Alonso