Sciweavers

1524 search results - page 267 / 305
» Computing effective communication policies in multiagent sys...
Sort
View
DSN
2007
IEEE
15 years 8 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
IPSN
2005
Springer
15 years 7 months ago
Building up to macroprogramming: an intermediate language for sensor networks
Abstract— There is widespread agreement that a higher level programming model for sensor networks is needed. A variety of models have been developed, but the community is far fro...
Ryan Newton, Arvind, Matt Welsh
ISQED
2003
IEEE
109views Hardware» more  ISQED 2003»
15 years 7 months ago
Modeling and Analysis of Power Distribution Networks for Gigabit Applications
—As the operating frequency of digital systems increases and voltage swing decreases, it becomes very important to characterize and analyze power distribution networks (PDNs) acc...
Wendemagegnehu T. Beyene, Chuck Yuan, Joong-Ho Kim...
ANCS
2007
ACM
15 years 6 months ago
Experimental evaluation of a coarse-grained switch scheduler
Modern high performance routers rely on sophisticated interconnection networks to meet ever increasing demands on capacity. Previous studies have used a combination of analysis an...
Charlie Wiseman, Jonathan S. Turner, Ken Wong, Bra...
DCOSS
2007
Springer
15 years 5 months ago
Energy Efficient Intrusion Detection in Camera Sensor Networks
The problem we address in this paper is how to detect an intruder moving through a polygonal space that is equipped with a camera sensor network. We propose a probabilistic sensor ...
Primoz Skraba, Leonidas J. Guibas