Sciweavers

6122 search results - page 1116 / 1225
» Securing network access in wireless sensor networks
Sort
View
MOBISYS
2007
ACM
15 years 9 months ago
Real-time deployment of multihop relays for range extension
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through mult...
Michael R. Souryal, Johannes Geissbuehler, Leonard...
MSS
2003
IEEE
97views Hardware» more  MSS 2003»
15 years 3 months ago
Design of the iSCSI Protocol
The iSCSI protocol enables accessing SCSI I/O devices over an IP network. TCP is used as a transport for SCSI I/O commands. We describe the design considerations and decisions in ...
Kalman Z. Meth, Julian Satran
POLICY
2007
Springer
15 years 4 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
ICDCSW
2003
IEEE
15 years 3 months ago
Controlled Availability of Pervasive Web Services
The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
Peter Robinson, Stefan Hild
SENSYS
2010
ACM
14 years 7 months ago
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
We present AutoWitness, a system to deter, detect, and track personal property theft, improve historically dismal stolen property recovery rates, and disrupt stolen property distr...
Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath...
« Prev « First page 1116 / 1225 Last » Next »