• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 117,509
Next 10 →

Wireless sensor networks: a survey

by I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci , 2002
"... This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review of fact ..."
Abstract - Cited by 1936 (23 self) - Add to MetaCart
This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review

privacy-preserving

by Abhishek Singh, Guido Urdaneta, Maarten Van Steen, Roman Vitenberg
"... leveraging social relationships for decentralized ..."
Abstract - Add to MetaCart
leveraging social relationships for decentralized

A survey of context-aware mobile computing research

by Guanling Chen, David Kotz , 2000
"... Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topi ..."
Abstract - Cited by 683 (2 self) - Add to MetaCart
and applications, we looked in depth at the types of context used and models of context information, at systems that support collecting and disseminating context, and at applications that adapt to the changing context. Through this survey, it is clear that context-aware research is an old but rich area

Distributed Computing in Practice: The Condor Experience

by Douglas Thain, Todd Tannenbaum, Miron Livny - Concurrency and Computation: Practice and Experience , 2005
"... Since 1984, the Condor project has enabled ordinary users to do extraordinary computing. Today, the project continues to explore the social and technical problems of cooperative computing on scales ranging from the desktop to the world-wide computational grid. In this chapter, we provide the history ..."
Abstract - Cited by 542 (7 self) - Add to MetaCart
Since 1984, the Condor project has enabled ordinary users to do extraordinary computing. Today, the project continues to explore the social and technical problems of cooperative computing on scales ranging from the desktop to the world-wide computational grid. In this chapter, we provide

Data Security

by Dorothy E. Denning, Peter J. Denning , 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract - Cited by 611 (3 self) - Add to MetaCart
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system

The Security of Vehicular Ad Hoc Networks

by Maxim Raya, Jean-Pierre Hubaux - SASN , 2005
"... Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, wh ..."
Abstract - Cited by 289 (12 self) - Add to MetaCart
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made

Formalising trust as a computational concept

by Stephen Paul Marsh , 1994
"... Trust is a judgement of unquestionable utility — as humans we use it every day of our lives. However, trust has suffered from an imperfect understanding, a plethora of definitions, and informal use in the literature and in everyday life. It is common to say “I trust you, ” but what does that mean? T ..."
Abstract - Cited by 518 (5 self) - Add to MetaCart
exploration of the possibilities of future work in the area. Summary 1. Overview This thesis presents an overview of trust as a social phenomenon and discusses it formally. It argues that trust is: • A means for understanding and adapting to the complexity of the environment. • A means of providing added

Marketing in Hypermedia Computer-Mediated Environments: Conceptual Foundations

by Donna L. Hoffman, Thomas P. Novak , 1995
"... ..."
Abstract - Cited by 535 (13 self) - Add to MetaCart
Abstract not found

Knowledge management and knowledge management systems: Conceptual foundations and an agenda . . .

by Maryam Alavi, Dorothy E. Leidner , 1998
"... ..."
Abstract - Cited by 823 (6 self) - Add to MetaCart
Abstract not found

Algorithmic Game Theory

by Tim Roughgarden , 2009
"... ..."
Abstract - Cited by 582 (15 self) - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 117,509
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University