Sciweavers

960 search results - page 185 / 192
» Sharing work in keyword search over databases
Sort
View
COMPSEC
2008
111views more  COMPSEC 2008»
14 years 9 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
WWW
2007
ACM
15 years 10 months ago
Connecting the "bottom of the pyramid": an exploratory case study of india's rural communication environment
This paper is based on our exploratory study of a South Indian village in Chamrajanagar district of Karnataka. The study was to understand the rural communication environment and ...
Sarita Seshagiri, Sagar Aman, Dhaval Joshi
114
Voted
WS
2005
ACM
15 years 3 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
SIGDOC
1998
ACM
15 years 2 months ago
Managing the Software Design Documents with XML
It is hard to manage the software design documents within a distributed development team. The issues include the format, distribution and evolution of data. This paper mainly focu...
Junichi Suzuki, Yoshikazu Yamamoto
DIALM
2004
ACM
161views Algorithms» more  DIALM 2004»
15 years 1 months ago
Batch conflict resolution algorithm with progressively accurate multiplicity estimation
The wireless connectivity, essential for pervasive computing, has ephemeral character and can be used for creating ad hoc networks, sensor networks, connection with RFID tags etc....
Petar Popovski, Frank H. P. Fitzek, Ramjee Prasad