Sciweavers

459 search results - page 75 / 92
» Malware Models for Network and Service Management
Sort
View
SASN
2003
ACM
15 years 2 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
MDM
2009
Springer
169views Communications» more  MDM 2009»
15 years 2 months ago
Adaptive Query Routing on Distributed Context - The COSINE Framework
Context-awareness has become a desired key feature of today’s mobile systems, yet, its realization still remains a challenge. On the one hand, mobile computing provides great po...
Lukasz Juszczyk, Harald Psaier, Atif Manzoor, Scha...
SAC
2010
ACM
15 years 4 months ago
A business driven cloud optimization architecture
In this paper, we discuss several facets of optimization in cloud computing, the corresponding challenges and propose an architecture for addressing those challenges. We consider ...
Marin Litoiu, C. Murray Woodside, Johnny Wong, Joa...
SODA
1996
ACM
157views Algorithms» more  SODA 1996»
14 years 10 months ago
Routing and Admission Control in General Topology Networks with Poisson Arrivals
Emerging high speed networks will carry tra c for services such as video-on-demand and video teleconferencing that require resource reservation along the path on which the tra c i...
Anil Kamath, Omri Palmon, Serge A. Plotkin
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
15 years 10 months ago
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
Abstract-- With fast paced growth of digital data and exploding storage management costs, enterprises are looking for new ways to effectively manage their data. One such cost-effec...
Aameek Singh, Ling Liu