Sciweavers

2454 search results - page 380 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ADVIS
2004
Springer
15 years 3 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan
KES
2004
Springer
15 years 3 months ago
Supporting Smart Applications in Multihop Ad-Hoc Networks - The GecGo Middleware
The goal of the GecGo middleware is to provide all the services required by self-organizing distributed applications running on multihop ad-hoc networks. Because of the frequent as...
Peter Sturm, Hannes Frey, Daniel Görgen, Joha...
INFOCOM
2003
IEEE
15 years 3 months ago
Energy Efficient Routing in Ad Hoc Disaster Recovery Networks
—The terrorist attacks on September 11, 2001 have drawn attention to the use of wireless technology in order to locate survivors of structural collapse. We propose to construct a...
Gil Zussman, Adrian Segall
INFOCOM
2000
IEEE
15 years 2 months ago
Constrained Multicast Routing in WDM Networks with Sparse Light Splitting
Abstract— As WDM technology matures and multicast applications become increasingly popular, supporting multicast at the WDM layer becomes an important and yet challenging topic. ...
Xijun Zhang, John Wei, Chunming Qiao
CSCW
2000
ACM
15 years 2 months ago
Distance, dependencies, and delay in a global collaboration
Collaborations over distance must contend with the loss of the rich, subtle interactions that co-located teams use to coordinate their work. Previous research has suggested that o...
James D. Herbsleb, Audris Mockus, Thomas A. Finhol...