Sciweavers

1559 search results - page 249 / 312
» Heuristic Approaches to Energy-Efficient Network Design Prob...
Sort
View
CONEXT
2009
ACM
15 years 2 days ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
COMCOM
2007
149views more  COMCOM 2007»
14 years 11 months ago
Cache invalidation strategies for internet-based mobile ad hoc networks
Internet-based mobile ad hoc network (IMANET) combines a mobile ad hoc network (MANET) and the Internet to provide universal information accessibility. Although caching frequently...
Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. D...
EUROPKI
2004
Springer
15 years 4 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith
MKM
2004
Springer
15 years 4 months ago
An Architecture for Distributed Mathematical Web Services
This paper describes technologies to create and maintain a problem solving environment based on a framework for distributed mathematical web services. Our approach allows clients t...
Elena S. Smirnova, Clare M. So, Stephen M. Watt
AINA
2010
IEEE
15 years 4 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...