Sciweavers

14897 search results - page 2755 / 2980
» Environment for statistical computing
Sort
View
126
Voted
COMCOM
2008
138views more  COMCOM 2008»
15 years 3 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
150
Voted
COMPSEC
2008
138views more  COMPSEC 2008»
15 years 3 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
141
Voted
CONCURRENCY
2008
127views more  CONCURRENCY 2008»
15 years 3 months ago
gLite Job Provenance - a job-centric view
ct Job Provenance (JP) is a Grid service that keeps long-term trace on completed computations for further reference. It is a job-centric service, keeping records about job life cyc...
Ales Krenek, Jirí Sitera, Ludek Matyska, Fr...
160
Voted
CORR
2010
Springer
87views Education» more  CORR 2010»
15 years 3 months ago
Publishing and Discovery of Mobile Web Services in Peer to Peer Networks
: It is now feasible to host Web Services on a mobile device due to the advances in cellular devices and mobile communication technologies. However, the reliability, usability and ...
Satish Narayana Srirama
122
Voted
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 3 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
« Prev « First page 2755 / 2980 Last » Next »