Sciweavers

2595 search results - page 415 / 519
» Addressing Computational Viewpoint Design
Sort
View
DIM
2008
ACM
15 years 4 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
DMSN
2008
ACM
15 years 4 months ago
Stream-based macro-programming of wireless sensor, actuator network applications with SOSNA
Wireless sensor, actuator networks (WSANs) distinguish themselves from wireless sensor networks by the need to coordinate actuators' actions, real-time constraints on communi...
Marcin Karpinski, Vinny Cahill
EMSOFT
2008
Springer
15 years 4 months ago
Wireless channel access reservation for embedded real-time systems
Reservation-based channel access has been shown to be effective in providing Quality of Service (QoS) guarantees (e.g., timeliness) in wireless embedded real-time applications suc...
Dinesh Rajan, Christian Poellabauer, Xiaobo Sharon...
INFOSCALE
2007
ACM
15 years 4 months ago
An agent-based decentralised process management framework for web service composition
Web service composition provision which requires efficient coordination of the execution of component services is a critical issue in service-oriented computing. Nowadays, BPEL4WS...
Jun Yan, Phillip Pidgeon, Aneesh Krishna, Jianming...
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
15 years 4 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...