Sciweavers

1692 search results - page 306 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 11 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
141
Voted
ICCS
2007
Springer
15 years 3 months ago
Building Verifiable Sensing Applications Through Temporal Logic Specification
Abstract. Sensing is at the core of virtually every DDDAS application. Sensing applications typically involve distributed communication and coordination over large self-organized n...
Asad Awan, Ahmed H. Sameh, Suresh Jagannathan, Ana...
GIS
2008
ACM
16 years 25 days ago
Sharing and exploring sensor streams over geocentric interfaces
We present SenseWeb, an open and scalable infrastructure for sharing and geocentric exploration of sensor data streams. SenseWeb allows sensor owners to share data streams across ...
Liqian Luo, Aman Kansal, Suman Nath, Feng Zhao
IJWIS
2007
153views more  IJWIS 2007»
14 years 11 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
MSWIM
2003
ACM
15 years 5 months ago
On the application of traffic engineering over bluetooth ad hoc networks
The seamless communication of data and voice over short-range, point-to-multipoint wireless links between mobile and/or stationary devices is becoming a reality by newly introduce...
Sachin Abhyankar, Rishi Toshniwal, Carlos de M. Co...