Sciweavers

888 search results - page 163 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
CSE
2009
IEEE
15 years 3 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
MATA
2000
Springer
15 years 3 months ago
Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture
Abstract. The ACORN provides an agent-based architecture for information retrieval and provision across networks. The main objective of this paper is to present the design and impl...
Hui Yu, Ali A. Ghorbani, Virendra C. Bhavsar, Step...
ISOLA
2010
Springer
14 years 10 months ago
Towards More Adaptive Voice Applications
With the Internet designed to provide best-effort packet transmission, applications are expected to adapt dynamically to the operating conditions observed in the network. For this ...
Jörg Ott
CAISE
2003
Springer
15 years 5 months ago
PIX-Grid: A Platform for P2P Photo Exchange
The proliferation of digital camera devices (stand-alone or combined with cell phones), new protocols such as MMS and the desire of people to communicate and share their experience...
Karl Aberer, Philippe Cudré-Mauroux, Anwita...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 3 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...