Sciweavers

3618 search results - page 615 / 724
» Dynamic Data Integration Using Web Services
Sort
View
118
Voted
ISPA
2005
Springer
15 years 8 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
126
Voted
DEBS
2007
ACM
15 years 6 months ago
Concepts and models for typing events for event-based systems
Event-based systems are increasingly gaining widespread attention for applications that require integration with loosely coupled and distributed systems for time-critical business...
Szabolcs Rozsnyai, Josef Schiefer, Alexander Schat...
139
Voted
CCS
2007
ACM
15 years 8 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
140
Voted
SIGIR
2005
ACM
15 years 8 months ago
Improving collection selection with overlap awareness in P2P search engines
Collection selection has been a research issue for years. Typically, in related work, precomputed statistics are employed in order to estimate the expected result quality of each ...
Matthias Bender, Sebastian Michel, Peter Triantafi...
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
15 years 8 months ago
Towards a Reliable and Efficient Distributed Storage System
This paper presents RDSS, a Resource Area Network (RAN)-based Distributed Storage System, which is designed for high scalability, long-term reliability, and operational efficiency...
Xiaodong Li, Chang Liu