Sciweavers

2454 search results - page 137 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CRITIS
2008
15 years 3 months ago
Testbeds for Assessing Critical Scenarios in Power Control Systems
Abstract. The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility Infrastructur...
Giovanna Dondossola, Geert Deconinck, Fabrizio Gar...
CMS
1996
167views Communications» more  CMS 1996»
15 years 2 months ago
Anonymous Mobility Management for Third Generation Mobile Networks
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mob...
Simon Hoff, Kai Jakobs, Dogan Kesdogan
KES
2008
Springer
15 years 1 months ago
Evaluation of a Prototype of the Mimamori-care System for Persons with Dementia
We aim to clarify the requirements for the mimamori-care system in the group home to support caregivers who take care of persons with dementia (PWD). We investigated the effects of...
Taro Sugihara, Kenichi Nakagawa, Tsutomu Fujinami,...
COOPIS
2004
IEEE
15 years 5 months ago
Evaluation of a Group Communication Middleware for Clustered J2EE Application Servers
Abstract. Clusters have become the de facto platform to scale J2EE application servers. Each tier of the server uses group communication to maintain consistency between replicated ...
Takoua Abdellatif, Emmanuel Cecchet, Renaud Lachai...
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
15 years 8 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...