Sciweavers

3452 search results - page 610 / 691
» Secure Data Outsourcing
Sort
View
134
Voted
ITNG
2008
IEEE
15 years 7 months ago
Implementing and Validating an Environmental and Health Monitoring System
In this paper the authors describe the implementation and validation of a prototype of an environmental and health monitoring system based on a Wireless Sensor Network (WSN). The ...
Marco Messina, Yen Yang Lim, Elaine Lawrence, Don ...
122
Voted
NDSS
2008
IEEE
15 years 7 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
108
Voted
RAM
2008
IEEE
172views Robotics» more  RAM 2008»
15 years 7 months ago
VT Position Code Communication Technology and Its Implementation
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
ShiYing Zhou, GuiHe Qin, YuBo Jin
90
Voted
SASO
2008
IEEE
15 years 7 months ago
Determining Object Safety Using a Multiagent, Collaborative System
We consider the problem of Object Safety: how objects endowed with processing, communication, and sensing capabilities can determine their safety. We assign an agent to each objec...
Brian Quanz, Costas Tsatsoulis
109
Voted
AINA
2007
IEEE
15 years 7 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...