Sciweavers

364 search results - page 42 / 73
» Monitoring, Analyzing, and Controlling Internet-scale System...
Sort
View
CCS
2010
ACM
14 years 8 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
SASN
2005
ACM
15 years 3 months ago
Coordinated sensor deployment for improving secure communications and sensing coverage
Sensor network has a great potential in applications such as habitat monitoring, wildlife tracking, building surveillance, and military combat. The design of a sensor network syst...
Yinian Mao, Min Wu
PERCOM
2009
ACM
15 years 4 months ago
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks
— Future application areas of wireless sensor networks (WSNs) may include industrial process automation, aircraft control systems or patient monitoring in hospitals. Such applica...
Petcharat Suriyachai, Utz Roedig, Andrew Scott
MOBICOM
2006
ACM
15 years 3 months ago
Using packet probes for available bandwidth estimation: a wireless testbed experience
Evaluating available bandwidth estimation methods requires a malleable MAC protocol implementation, precise MAC layer packet timing measurements, and the ability to create control...
Mesut Ali Ergin, Marco Gruteser
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes