Sciweavers

7160 search results - page 1341 / 1432
» Organizing Multiagent Systems
Sort
View
119
Voted
MOBIHOC
2003
ACM
16 years 3 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
117
Voted
CSCW
2010
ACM
15 years 10 months ago
Telling the whole story: anticipation, inspiration and reputation in a field deployment of TellTable
We present a field study of TellTable, a new storytelling system designed to support creativity and collaboration amongst children. The application was deployed on a multitouch in...
Xiang Cao, Siân E. Lindley, John Helmes, Abi...
122
Voted
IPSN
2010
Springer
15 years 10 months ago
Multichannel reliability assessment in real world WSNs
We study the utility of dynamic frequency agility in realworld wireless sensor networks. Many view such agility as essential to obtaining adequate reliability in industrial enviro...
Jorge Ortiz, David E. Culler
129
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Scalable Web Content Attestation
—The web is a primary means of information sharing for most organizations and people. Currently, a recipient of web content knows nothing about the environment in which that info...
Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman...
IDTRUST
2009
ACM
15 years 10 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
« Prev « First page 1341 / 1432 Last » Next »