Sciweavers

4859 search results - page 860 / 972
» Distributed Computing in a Heterogeneous Computing Environme...
Sort
View
122
Voted
SACMAT
2009
ACM
15 years 9 months ago
Safety in discretionary access control for logic-based publish-subscribe systems
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the pr...
Kazuhiro Minami, Nikita Borisov, Carl A. Gunter
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 9 months ago
Severely Fading MIMO Channels: Models and Mutual Information
— In most wireless communications research, the channel models considered experience less severe fading than the classic Rayleigh fading case. In this work, however, we investiga...
Seung Ho Choi, Peter Smith, Ben Allen, Wasim Q. Ma...
ICNP
2007
IEEE
15 years 9 months ago
Slotted Scheduled Tag Access in Multi-Reader RFID Systems
Abstract—Radio frequency identification (RFID) is a technology where a reader device can “sense” the presence of a closeby object by reading a tag device attached to the obj...
Zongheng Zhou, Himanshu Gupta, Samir R. Das, Xianj...
DCOSS
2007
Springer
15 years 9 months ago
A Connectivity Based Partition Approach for Node Scheduling in Sensor Networks
This paper presents a Connectivity based Partition Approach (CPA) to reduce the energy consumption of a sensor network by sleep scheduling among sensor nodes. CPA partitions sensor...
Yong Ding, Chen Wang, Li Xiao
OTM
2007
Springer
15 years 9 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...