Sciweavers

8655 search results - page 1317 / 1731
» Challenges for Trusted Computing
Sort
View
MSR
2006
ACM
15 years 10 months ago
An open framework for CVS repository querying, analysis and visualization
We present an open framework for visual mining of CVS software repositories. We address three aspects: data extraction, analysis and visualization. We first discuss the challenges...
Lucian Voinea, Alexandru Telea
PEWASUN
2006
ACM
15 years 10 months ago
Context-aware multicast routing scheme for disruption tolerant networks
: Disruption Tolerant Networks (DTNs) are emerging solutions to networks that experience frequent network partitions and large end-to-end delays. Several schemes have been proposed...
Peng Yang, Mooi Choo Chuah
SASN
2006
ACM
15 years 10 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
SASN
2006
ACM
15 years 10 months ago
Seven cardinal properties of sensor network broadcast authentication
We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, su...
Mark Luk, Adrian Perrig, Bram Whillock
SIGCOMM
2006
ACM
15 years 10 months ago
Jigsaw: solving the puzzle of enterprise 802.11 analysis
The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11-based networks ubiquitous in the enterprise...
Yu-Chung Cheng, John Bellardo, Péter Benk&o...
« Prev « First page 1317 / 1731 Last » Next »