Sciweavers

978 search results - page 157 / 196
» WiMAX networks: from access to service platform
Sort
View
ICDE
2009
IEEE
149views Database» more  ICDE 2009»
15 years 11 months ago
OPAQUE: Protecting Path Privacy in Directions Search
Directions search returns the shortest path from a source to a destination on a road network. However, the search interests of users may be exposed to the service providers, thus r...
Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baih...
DISCEX
2003
IEEE
15 years 3 months ago
Improving Failure Responsiveness in Jini Leasing
Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Scott Rose, Kevin Bowers, Stephen Quirolgico, Kevi...
ACMIDC
2009
15 years 1 months ago
Designing intergenerational mobile storytelling
Informal educational experiences with grandparents and other older adults can be an important component of childrens education, especially in circumstances where high quality educ...
Allison Druin, Benjamin B. Bederson, Alexander J. ...
VL
2008
IEEE
149views Visual Languages» more  VL 2008»
15 years 4 months ago
Collaborative end-user development on handheld devices
Web 2.0 has enabled end users to collaborate through their own developed artifacts, moving on from text (e.g., Wikipedia, Blogs) to images (e.g., Flickr) and movies (e.g., YouTube...
Navid Ahmadi, Alexander Repenning, Andri Ioannidou
IJISEC
2011
71views more  IJISEC 2011»
14 years 1 months ago
Principles of remote attestation
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guid...
George Coker, Joshua D. Guttman, Peter Loscocco, A...