Sciweavers

620 search results - page 94 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ISI
2005
Springer
15 years 3 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
IWDC
2005
Springer
210views Communications» more  IWDC 2005»
15 years 3 months ago
Mobile Agent Based Message Communication in Large Ad Hoc Networks Through Co-operative Routing Using Inter-agent Negotiation at
:- The wide availability of mobile devices equipped with wireless communication capabilities together with the technical possibility to form ad hoc networks paves the way for build...
Parama Bhaumik, Somprakash Bandyopadhyay
SDMW
2005
Springer
15 years 3 months ago
XML Security in the Next Generation Optical Disc Context
The Extensible Markup Language (XML) is considered as the de facto standard for information processing and exchange on the Internet and in the enterprise services domain. It is wid...
Gopakumar Nair, Ajeesh Gopalakrishnan, Sjouke Mauw...
COMPSAC
2003
IEEE
15 years 3 months ago
An Object-Passing Model for Parallel Programming
This paper introduces an object-passing model for parallel and distributed application development. Object passing provides the object-oriented application developer with powerful...
Jameela Al-Jaroodi, Nader Mohamed
RTSS
2003
IEEE
15 years 3 months ago
Contention-Free Periodic Message Scheduler Medium Access Control in Wireless Sensor / Actuator Networks
This paper presents a time division multiple access medium access control protocol for wireless sensor / actuator networks implemented with a contention-free message scheduler. A ...
Thomas W. Carley, Moussa A. Ba, Rajeev Barua, Davi...