Sciweavers

2167 search results - page 361 / 434
» On the need for statistical timing analysis
Sort
View
LCN
2008
IEEE
15 years 6 months ago
Understanding and using mobility on Publish/Subscribe based architectures for MANETs
Abstract—Mobile Ad Hoc Networks present several new challenges, mainly due to mobility. Publish/Subscribe is a communication paradigm that fits this network model well since the...
Cristiano G. Rezende, Azzedine Boukerche, Bruno P....
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 6 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
COLCOM
2007
IEEE
15 years 6 months ago
Privacy protection on sliding window of data streams
—In many applications, transaction data arrive in the form of high speed data streams. These data contain a lot of information about customers that needs to be carefully managed ...
Weiping Wang 0001, Jianzhong Li, Chunyu Ai, Yingsh...
IPPS
2007
IEEE
15 years 6 months ago
Novel Broadcast/Multicast Protocols for Dynamic Sensor Networks
: In this paper, we have proposed a time efficient, energy saving and robust broadcast/multicast protocol for reconfigurable cluster-based sensor network. In our broadcast protocol...
Wei Chen, Islam A. K. M. Muzahidul, Mohan Malkani,...
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 6 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003