-
1
-
-
84894714314
-
-
Diaspora, http://www.joindiaspora.com
-
Diaspora
-
-
-
4
-
-
0032656633
-
Matching events in a content-based subscription system
-
ACM, New York
-
Aguilera, M.K., Strom, R.E., Sturman, D.C., Astley, M., Chandra, T.D.: Matching events in a content-based subscription system. In: PODC 1999: Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing. ACM, New York (1999)
-
(1999)
PODC 1999: Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing
-
-
Aguilera, M.K.1
Strom, R.E.2
Sturman, D.C.3
Astley, M.4
Chandra, T.D.5
-
5
-
-
84891624492
-
Off by default
-
Citeseer
-
Ballani, H., Chawathe, Y., Ratnasamy, S., Roscoe, T., Shenker, S.: Off by default. In: Proc. 4th ACM Workshop on Hot Topics in Networks (Hotnets-IV), Citeseer (2005)
-
(2005)
Proc. 4th ACM Workshop on Hot Topics in Networks (Hotnets-IV)
-
-
Ballani, H.1
Chawathe, Y.2
Ratnasamy, S.3
Roscoe, T.4
Shenker, S.5
-
6
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
84870510126
-
Virtual individual servers as privacy-preserving proxies for mobile devices
-
ACM
-
Cáceres, R., Cox, L., Lim, H., Shakimov, A., Varshavsky, A.: Virtual individual servers as privacy-preserving proxies for mobile devices. In: Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds, pp. 37-42. ACM (2009)
-
(2009)
Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds
, pp. 37-42
-
-
Cáceres, R.1
Cox, L.2
Lim, H.3
Shakimov, A.4
Varshavsky, A.5
-
8
-
-
0345565888
-
The many faces of publish/subscribe
-
Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.-M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114-131 (2003)
-
(2003)
ACM Comput. Surv.
, vol.35
, Issue.2
, pp. 114-131
-
-
Eugster, P.T.1
Felber, P.A.2
Guerraoui, R.3
Kermarrec, A.-M.4
-
9
-
-
36949033084
-
-
Ford, B., Strauss, J., Lesniewski, C., Rhea, S., Kaashoek, F., Morris, R.: Persistent Personal Names for Globally Connected Mobile Devices
-
Persistent Personal Names for Globally Connected Mobile Devices
-
-
Ford, B.1
Strauss, J.2
Lesniewski, C.3
Rhea, S.4
Kaashoek, F.5
Morris, R.6
-
10
-
-
70450233562
-
Majab: Improving resource management for web-based applications on mobile devices
-
ACM, New York
-
Li, D., Anand, M.: Majab: improving resource management for web-based applications on mobile devices. In: MobiSys 2009: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, pp. 95-108. ACM, New York (2009)
-
(2009)
MobiSys 2009: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services
, pp. 95-108
-
-
Li, D.1
Anand, M.2
-
11
-
-
84995476635
-
Mobiclique: Middleware for mobile social networking
-
ACM, New York
-
Pietiläinen, A.-K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: Mobiclique: middleware for mobile social networking. In: WOSN 2009: Proceedings of the 2nd ACM Workshop on Online Social Networks, pp. 49-54. ACM, New York (2009)
-
(2009)
WOSN 2009: Proceedings of the 2nd ACM Workshop on Online Social Networks
, pp. 49-54
-
-
Pietiläinen, A.-K.1
Oliver, E.2
LeBrun, J.3
Varghese, G.4
Diot, C.5
-
12
-
-
54549114648
-
Horde: Separating network striping policy from mechanism
-
Qureshi, A., Guttag, J.V.: Horde: separating network striping policy from mechanism. In: MobiSys, pp. 121-134 (2005)
-
(2005)
MobiSys
, pp. 121-134
-
-
Qureshi, A.1
Guttag, J.V.2
-
13
-
-
85076887479
-
Cimbiosys: A platform for content-based partial replication
-
USENIX Association, Berkeley
-
Ramasubramanian, V., Rodeheffer, T.L., Terry, D.B., Walraed-Sullivan, M., Wobber, T., Marshall, C.C., Vahdat, A.: Cimbiosys: a platform for content-based partial replication. In: NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 261-276. USENIX Association, Berkeley (2009)
-
(2009)
NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation
, pp. 261-276
-
-
Ramasubramanian, V.1
Rodeheffer, T.L.2
Terry, D.B.3
Walraed-Sullivan, M.4
Wobber, T.5
Marshall, C.C.6
Vahdat, A.7
-
14
-
-
67650293214
-
Understanding and capturing people privacy policies in a mobile social networking application
-
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6), 401-412 (2009)
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 401-412
-
-
Sadeh, N.1
Hong, J.2
Cranor, L.3
Fette, I.4
Kelley, P.5
Prabaker, M.6
Rao, J.7
-
15
-
-
0036949371
-
Wake on wireless: An event driven energy saving strategy for battery operated devices
-
ACM, New York
-
Shih, E., Bahl, P., Sinclair, M.: Wake on wireless: An event driven energy saving strategy for battery operated devices. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 160-171. ACM, New York (2002)
-
(2002)
Proceedings of the 8th Annual International Conference on Mobile Computing and Networking
, pp. 160-171
-
-
Shih, E.1
Bahl, P.2
Sinclair, M.3
-
16
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000 (2000)
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
17
-
-
33846685511
-
Turducken: Hierarchical power management for mobile devices
-
ACM, New York
-
Sorber, J., Banerjee, N., Corner, M., Rollins, S.: Turducken: Hierarchical power management for mobile devices. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services. ACM, New York (2005)
-
(2005)
Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services
-
-
Sorber, J.1
Banerjee, N.2
Corner, M.3
Rollins, S.4
-
18
-
-
38149074798
-
Haggle: Seamless Networking for Mobile Applications
-
Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. Springer, Heidelberg
-
Su, J., Scott, J., Hui, P., Crowcroft, J., De Lara, E., Diot, C., Goel, A., Lim, M., Upton, E.: Haggle: Seamless Networking for Mobile Applications. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 391-408. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4717
, pp. 391-408
-
-
Su, J.1
Scott, J.2
Hui, P.3
Crowcroft, J.4
De Lara, E.5
Diot, C.6
Goel, A.7
Lim, M.8
Upton, E.9
-
19
-
-
78650760108
-
Bootstrapping Deny-By-Default Access Control for Mobile Ad-Hoc Networks
-
Zhang, H., DeCleene, B., Kurose, J., Towsley, D.: Bootstrapping Deny-By-Default Access Control For Mobile Ad-Hoc Networks. In: IEEE Military Communications Conference (MILCOM) 2008, San Diego, November 17-19 (2008)
-
IEEE Military Communications Conference (MILCOM) 2008, San Diego, November 17-19 (2008)
-
-
Zhang, H.1
DeCleene, B.2
Kurose, J.3
Towsley, D.4
|