Sciweavers

2912 search results - page 339 / 583
» Overlay Networks - Implementation by Specification
Sort
View
CCS
2008
ACM
15 years 6 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
IIWAS
2008
15 years 6 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang
ACSW
2006
15 years 6 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
APIN
2008
110views more  APIN 2008»
15 years 4 months ago
Explaining inferences in Bayesian networks
While Bayesian network (BN) can achieve accurate predictions even with erroneous or incomplete evidence, explaining the inferences remains a challenge. Existing approaches fall sh...
Ghim-Eng Yap, Ah-Hwee Tan, HweeHwa Pang
152
Voted
CN
2006
85views more  CN 2006»
15 years 4 months ago
An efficient heuristic for selecting active nodes in wireless sensor networks
Energy saving is a paramount concern in wireless sensor networks (WSNs). A strategy for energy saving is to cleverly manage the duty cycle of sensors, by dynamically activating di...
Flávia Coimbra Delicato, Fábio Prott...