Sciweavers

332 search results - page 57 / 67
» adhoc 2008
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 18 days ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
ATAL
2008
Springer
13 years 8 months ago
A mobile agent approach to opportunistic harvesting in wireless sensor networks
This demonstration illustrates the feasibility of harvesting data from a WSN by interested parties, either in the WSN coverage area or in a remote location. Embedded and mobile ag...
Richard Tynan, Conor Muldoon, Michael J. O'Grady, ...
COLCOM
2008
IEEE
13 years 8 months ago
Mashup Model and Verification Using Mashup Processing Network
Abstract. Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term...
Ehtesham Zahoor, Olivier Perrin, Claude Godart
CONEXT
2008
ACM
13 years 8 months ago
Towards systematic design of enterprise networks
Enterprise networks are important, with size and complexity even surpassing carrier networks. Yet, the design of enterprise networks remains ad-hoc and poorly understood. In this p...
Yu-Wei Eric Sung, Sanjay G. Rao, Geoffrey G. Xie, ...
CSCW
2008
ACM
13 years 8 months ago
Small details: using one device to navigate together
We present results from a study examining the sensitivity of group navigation strategies to changes in route presentation on a shared mobile device. Two content-equivalent interfa...
Derek F. Reilly, Bonnie MacKay, Carolyn R. Watters...