Sciweavers

1424 search results - page 203 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ARC
2007
Springer
116views Hardware» more  ARC 2007»
15 years 7 months ago
Systematic Customization of On-Chip Crossbar Interconnects
Abstract. In this paper, we present a systematic design and implementation of reconfigurable interconnects on demand. The proposed on-chip interconnection network provides identic...
Jae Young Hur, Todor Stefanov, Stephan Wong, Stama...
ICAD
2004
15 years 2 months ago
How Long Does it Take to Identify Everyday Sounds?
Previous studies of alarm design have concluded that the faster a mental representation of the cause of the alarm is activated, the quicker the adapted reaction. In order to selec...
Anne Guillaume, Lionel Pellieux, Véronique ...
IPSN
2007
Springer
15 years 7 months ago
Underground structure monitoring with wireless sensor networks
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-...
Mo Li, Yunhao Liu
SACMAT
2006
ACM
15 years 7 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
GI
2009
Springer
14 years 11 months ago
An Improved Method for creating Shared Belief in Communication Constrained Sensor Networks
: Networked systems that gather sensor data in order to react to phenomena in their surroundings are faced with a growing need for adaptive behavior to operate in dynamically chang...
Eelke van Foeken, Peter Hiemstra, Leon Kester