Sciweavers

164 search results - page 25 / 33
» An Architectural Design for Secure Mobile Remote Macro-Payme...
Sort
View
83
Voted
MOBIHOC
2010
ACM
14 years 7 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
OOPSLA
2009
Springer
15 years 4 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
CCS
2008
ACM
14 years 11 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
GRID
2000
Springer
15 years 1 months ago
Data Management in an International Data Grid Project
Abstract. In this paper we report on preliminary work and architectural design carried out in the "Data Management" work package in the International Data Grid project. O...
Wolfgang Hoschek, Francisco Javier Jaén-Mar...