Sciweavers

2454 search results - page 236 / 491
» Privacy in the Information and Communications Technologies
Sort
View
IJSNET
2006
106views more  IJSNET 2006»
15 years 1 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
GLOBECOM
2010
IEEE
14 years 11 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
INFOCOM
2010
IEEE
14 years 11 months ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu
WEBI
2007
Springer
15 years 8 months ago
Extending XML Query Language Xcerpt by Ontology Queries
The paper addresses a problem of combining XML querying with ontology reasoning. We present an extension of a rule-based XML query and transformation language Xcerpt. The extensio...
Wlodzimierz Drabent, Artur Wilk
124
Voted
INAP
2005
Springer
15 years 7 months ago
Prolog Cafe : A Prolog to Java Translator System
We present the Prolog Cafe system that translates Prolog into Java via the WAM. Prolog Cafe provides multi-threaded Prolog engines. A Prolog Cafe thread seem to be conceptually an ...
Mutsunori Banbara, Naoyuki Tamura, Katsumi Inoue