Sciweavers

336 search results - page 41 / 68
» Mobile values, new names, and secure communication
Sort
View
MOBISYS
2010
ACM
14 years 12 months ago
Docx2Go: collaborative editing of fidelity reduced documents on mobile devices
Docx2Go is a new framework to support editing of shared documents on mobile devices. Three high-level requirements influenced its design -- namely, the need to adapt content, espe...
Krishna P. N. Puttaswamy, Catherine C. Marshall, V...
MOBIHOC
2010
ACM
14 years 7 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
81
Voted
ML
2006
ACM
103views Machine Learning» more  ML 2006»
15 years 3 months ago
Type-safe distributed programming for OCaml
Existing ML-like languages guarantee type-safety, ensuring memty and protecting the invariants of abstract types, but only within single executions of single programs. Distributed...
John Billings, Peter Sewell, Mark R. Shinwell, Rok...
TON
2008
86views more  TON 2008»
14 years 9 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
SENSYS
2006
ACM
15 years 3 months ago
Interest dissemination with directional antennas for wireless sensor networks with mobile sinks
Introducing mobile data sinks into wireless sensor networks (WSNs) improves the energy efficiency and the network lifetime, and is demanded for many application scenarios, such a...
Yihong Wu, Lin Zhang, Yiqun Wu, Zhisheng Niu