Sciweavers

2213 search results - page 342 / 443
» On the Scalability of Centralized Control
Sort
View
JSW
2008
240views more  JSW 2008»
15 years 1 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
JSW
2008
101views more  JSW 2008»
15 years 1 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
JNW
2006
120views more  JNW 2006»
15 years 1 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
JSAC
2006
107views more  JSAC 2006»
15 years 1 months ago
Efficiency and Braess' Paradox under pricing in general networks
We study the flow control and routing decisions of self-interested users in a general congested network where a single profit-maximizing service provider sets prices for different ...
Xin Huang, Asuman E. Ozdaglar, Daron Acemoglu
JUCS
2006
86views more  JUCS 2006»
15 years 1 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...