Sciweavers

1338 search results - page 46 / 268
» A Secure Communications Infrastructure for High-Performance ...
Sort
View
157
Voted
WISEC
2010
ACM
15 years 6 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
178
Voted
CCGRID
2008
IEEE
15 years 8 months ago
GridBatch: Cloud Computing for Large-Scale Data-Intensive Batch Applications
To be competitive, Enterprises are collecting and analyzing increasingly large amount of data in order to derive business insights. However, there are at least two challenges to m...
Huan Liu, Dan Orban
CORR
2006
Springer
97views Education» more  CORR 2006»
15 years 1 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
SC
2005
ACM
15 years 7 months ago
SPICE: Simulated Pore Interactive Computing Environment
— SPICE aims to understand the vital process of translocation of biomolecules across protein pores by computing the free energy profile of the translocating biomolecule along th...
Shantenu Jha, Peter V. Coveney, Matt J. Harvey
92
Voted
IFIP
2007
Springer
15 years 8 months ago
Lessons Learned from the Maroochy Water Breach
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and control operations in electrical power distribution facilities, oil and gas pipelines, water...
Jill Slay, Michael Miller