Sciweavers

2139 search results - page 58 / 428
» Distributed computing and computer security education
Sort
View
CORR
2010
Springer
147views Education» more  CORR 2010»
14 years 8 months ago
Cluster based Key Management in Wireless Sensor Networks
—Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clus...
Anvesh Aileni
SOSP
2003
ACM
15 years 6 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
CORR
2010
Springer
141views Education» more  CORR 2010»
14 years 10 months ago
Termination Detection of Local Computations
Contrary to the sequential world, the processes involved in a distributed system do not necessarily know when a computation is globally finished. This paper investigates the proble...
Emmanuel Godard, Yves Métivier, Gerard Tel
WPES
2004
ACM
15 years 3 months ago
Privacy preserving route planning
The number of location-aware mobile devices has been rising for several years. As this trend continues, these devices may be able to use their location information to provide inte...
Keith B. Frikken, Mikhail J. Atallah
CCS
2009
ACM
15 years 4 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu