Sciweavers

9581 search results - page 1716 / 1917
» On Ubiquitous Integrated Computing
Sort
View
151
Voted
WIOPT
2005
IEEE
15 years 10 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
SAC
2005
ACM
15 years 10 months ago
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks
A great jump towards the advent of the Semantic Web will take place when a critical mass of web resources is available for use in a semantic way. This goal can be reached by the c...
Dario Bonino, Fulvio Corno, Federico Pescarmona
SAC
2005
ACM
15 years 10 months ago
Handling run-time updates in distributed applications
The server side of business software systems is commonly implemented today by an ensemble of Java classes distributed over several hosts. In this scenario, it is often necessary, ...
Marco Milazzo, Giuseppe Pappalardo, Emiliano Tramo...
154
Voted
SAC
2005
ACM
15 years 10 months ago
Performance analysis framework for large software-intensive systems with a message passing paradigm
The launch of new features for mobile phones is increasing and the product life cycle symmetrically decreasing in duration as higher levels of sophistication are reached. Therefor...
Christian Del Rosso
SASN
2005
ACM
15 years 10 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
« Prev « First page 1716 / 1917 Last » Next »