Sciweavers

279 search results - page 55 / 56
» Providing Security in 4G Systems: Unveiling the Challenges
Sort
View
ISCAS
2006
IEEE
160views Hardware» more  ISCAS 2006»
13 years 11 months ago
Address-event image sensor network
We describe a sensor network based on smart requirements of the network. This will provide a new approach imager sensors able to extract events of interest from a scene. for compos...
Eugenio Culurciello, Andreas Savvides
AHSWN
2006
206views more  AHSWN 2006»
13 years 5 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
SIGMOD
2002
ACM
142views Database» more  SIGMOD 2002»
14 years 5 months ago
The Grid: An Application of the Semantic Web
The Grid is an emerging platform to support on-demand "virtual organisations" for coordinated resource sharing and problem solving on a global scale. The application thr...
Carole A. Goble, David De Roure
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 2 days ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
OOPSLA
2005
Springer
13 years 10 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll