Sciweavers

448 search results - page 56 / 90
» k-anonymous message transmission
Sort
View
CHI
2007
ACM
16 years 8 days ago
Location, location, location: a study of bluejacking practices
We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones withi...
Jennifer Thom-Santelli, Alex Ainslie, Geri Gay
WKDD
2010
CPS
217views Data Mining» more  WKDD 2010»
15 years 6 months ago
Two-round Multi-Party Contract Signing
—A multi-party contract signing (MPCS) protocol allows a set of parties to exchange messages with each other to reach a state in which either each of them has a pre-agreed contra...
Xiangdong Li, Qiusheng Zheng
AINA
2008
IEEE
15 years 6 months ago
Wireless Sensor Network for Localized Maritime Monitoring
In this paper, we propose a novel routing algorithm for maritime monitoring of short term events where large area monitoring relies on small buoys drifting along with local curren...
Pedro N. E. S. Barbosa, Neil M. White, Nick R. Har...
SECON
2008
IEEE
15 years 6 months ago
Practical Localized Network Coding in Wireless Mesh Networks
—In this paper, BFLY–a practical localized network coding protocol for wireless mesh networks–is proposed. To supplement forwarding packets in classical networks, intermediat...
Oluwasoji Omiwade, Rong Zheng, Cunqing Hua
CCGRID
2007
IEEE
15 years 6 months ago
Reliability Analysis of Self-Healing Network using Discrete-Event Simulation
The number of processors embedded on high performance computing platforms is continuously increasing to accommodate user desire to solve larger and more complex problems. However,...
Thara Angskun, George Bosilca, Graham E. Fagg, Jel...