Sciweavers

1436 search results - page 209 / 288
» Personalized Redirection of Communication
Sort
View
SASN
2004
ACM
15 years 9 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
SENSYS
2004
ACM
15 years 9 months ago
Medians and beyond: new aggregation techniques for sensor networks
Wireless sensor networks offer the potential to span and monitor large geographical areas inexpensively. Sensors, however, have significant power constraint (battery life), makin...
Nisheeth Shrivastava, Chiranjeeb Buragohain, Divya...
SIGCOMM
2004
ACM
15 years 9 months ago
A scalable distributed information management system
We present a Scalable Distributed Information Management System (SDIMS) that aggregates information about large-scale networked systems and that can serve as a basic building bloc...
Praveen Yalagandula, Michael Dahlin
CCS
2004
ACM
15 years 9 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
ACMICEC
2003
ACM
182views ECommerce» more  ACMICEC 2003»
15 years 9 months ago
eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments
In recent years, the growth of Mobile Computing, Electronic Commerce and Mobile Electronic Commerce has created a new concept of Mobile Electronic Marketing. New marketing models ...
Olga Ratsimor, Timothy W. Finin, Anupam Joshi, Yel...