Sciweavers

232 search results - page 34 / 47
» Contraction Approach to Power Control, with Non-Monotonic Ap...
Sort
View
HASE
2008
IEEE
15 years 4 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...
IEEECIT
2009
IEEE
15 years 4 months ago
SLA-Aware Virtual Resource Management for Cloud Infrastructures
Cloud platforms host several independent applications on a shared resource pool with the ability to allocate computing power to applications on a per-demand basis. The use of serv...
Hien Nguyen Van, Frédéric Dang Tran,...
SEC
2007
14 years 11 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
RTSS
2005
IEEE
15 years 3 months ago
ParaScale: Exploiting Parametric Timing Analysis for Real-Time Schedulers and Dynamic Voltage Scaling
Static timing analysis safely bounds worst-case execution times to determine if tasks can meet their deadlines in hard real-time systems. However, conventional timing analysis req...
Sibin Mohan, Frank Mueller, William Hawkins, Micha...
TMC
2010
124views more  TMC 2010»
14 years 8 months ago
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
—The key feature of many emerging pervasive computing applications is to proactively provide services to mobile individuals. One major challenge in providing users with proactive...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki L...