Sciweavers

798 search results - page 141 / 160
» Statecharts as Protocols for Objects
Sort
View
JAMIA
2010
76views more  JAMIA 2010»
14 years 6 months ago
The inadvertent disclosure of personal health information through peer-to-peer file sharing programs
Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheu...
Khaled El Emam, Emilio Neri, Elizabeth Jonker, Mar...
INFOCOM
2011
IEEE
14 years 3 months ago
iLight: Indoor device-free passive tracking using wireless sensor networks
—Target tracking is a main application of wireless sensor networks (WSNs), and has been studied widely [4], [10]. In this work, we study indoor passive tracking problem using WSN...
XuFei Mao, ShaoJie Tang, XiaoHua Xu, Xiang-Yang Li...
WWW
2006
ACM
16 years 13 days ago
Analysis of WWW traffic in Cambodia and Ghana
In this paper we present an analysis of HTTP traffic captured from Internet caf?es and kiosks from two different developing countries ? Cambodia and Ghana. This paper has two main...
Bowei Du, Michael J. Demmer, Eric A. Brewer
WWW
2004
ACM
16 years 13 days ago
RDFPeers: a scalable distributed RDF repository based on a structured peer-to-peer network
Centralized Resource Description Framework (RDF) repositories have limitations both in their failure tolerance and in their scalability. Existing Peer-to-Peer (P2P) RDF repositori...
Min Cai, Martin R. Frank
POPL
2001
ACM
16 years 1 days ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi