Sciweavers

1266 search results - page 48 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
GIS
2009
ACM
16 years 29 days ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
DCOSS
2009
Springer
14 years 9 months ago
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
Agnelo R. Silva, Mehmet C. Vuran
ICIAP
1997
ACM
15 years 4 months ago
The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data
The European Concerted Action \COMPARES" (Concerted Action on COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data) was funded within the Environment an...
Jim Austin, Giorgio Giacinto, I. Kanellopoulos, Ke...
OTM
2005
Springer
15 years 5 months ago
Evaluation of Three Approaches for CORBA Firewall/NAT Traversal
Applications that use CORBA as communication layer often have some restrictions for multi-domain deployment. This is particularly true when they have to face firewall/NAT traversa...
Antonio Theophilo Costa, Markus Endler, Renato Cer...
PEWASUN
2004
ACM
15 years 5 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...