Sciweavers

1266 search results - page 36 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
PERCOM
2009
ACM
15 years 6 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
COLCOM
2007
IEEE
15 years 6 months ago
Collaborative motion planning of autonomous robots
—In disaster areas, office buildings, or at home, multiple autonomous networked mobile robots may act instead of human beings. These robots have to move to their destination so ...
Takashi Okada, Razvan Beuran, Junya Nakata, Yasuo ...
EUROMICRO
1997
IEEE
15 years 4 months ago
HPO: a programming environment for object-oriented metacomputing
Metacomputing is an emergent paradigm that makes possible to distribute applications over a heterogeneous set of computing systems to exploit all available resources. The paper pr...
Antonio Corradi, Letizia Leonardi, Franco Zambonel...
SERVICES
2010
119views more  SERVICES 2010»
15 years 1 months ago
The Networked Environment for Music Analysis (NEMA)
Abstract--Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR) presents particular challenges to MIR researchers due to issues o...
Kris West, Amit Kumar, Andrew Shirk, Guojun Zhu, J...
GCC
2005
Springer
15 years 5 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao