Sciweavers

888 search results - page 158 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
CD
2005
Springer
15 years 5 months ago
Cooperative Component-Based Software Deployment in Wireless Ad Hoc Networks
Abstract. This paper presents a middleware platform we designed in order to allow the deployment of component-based software applications on mobile devices (such as laptops or pers...
Hervé Roussain, Frédéric Guid...
CCS
2004
ACM
15 years 5 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
PERCOM
2005
ACM
15 years 11 months ago
PICASSO: Pervasive Information Chronicling, Access, Search, and Sharing for Organizations
Several researchers have pointed out and begun to demonstrate that it is now possible to digitize an entire lifetime of experiences into a pocket-sized storage device, and thus to...
Gopal Pingali, Mark Podlaseck, Sinem Güven
PDP
2008
IEEE
15 years 6 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
ICDCSW
2007
IEEE
15 years 6 months ago
Context to Make You More Aware
The goal of our work is to help users make more informed choices about what physical activities they undertake. One example is to provide relevant information to help someone choo...
Adrienne H. Andrew, Yaw Anokwa, Karl Koscher, Jona...