Sciweavers

15860 search results - page 2903 / 3172
» Agent-Based Software Engineering
Sort
View
126
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel
158
Voted
COMSWARE
2007
IEEE
15 years 10 months ago
An Architecture and a Programming Interface for Application-Aware Data Dissemination Using Overlay Networks
- Many real-time distributed collaborative applications are emerging that require exchange of critical sensor data among geographically distant end users under resource-constrained...
Tarun Banka, Panho Lee, Anura P. Jayasumana, Jim K...
141
Voted
COMSWARE
2007
IEEE
15 years 10 months ago
Exploiting Energy-aware Spatial Correlation in Wireless Sensor Networks
Abstract— Wireless sensor networks (WSNs) promise finegrain monitoring in a wide variety of applications, which require dense sensor nodes deployment. Due to high density of nod...
Ghalib A. Shah, Muslim Bozyigit
134
Voted
COMSWARE
2007
IEEE
15 years 10 months ago
Integrated Data Location in Multihop Wireless Networks
Abstract— Multihop wireless networks are ideal as infrastructures for location-aware network applications, particularly for disaster recovery operations. However, one missing com...
Irfan Sheriff, Prashanth Aravinda Kumar Acharya, A...
126
Voted
COMSWARE
2007
IEEE
15 years 10 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
« Prev « First page 2903 / 3172 Last » Next »