Sciweavers

13822 search results - page 2544 / 2765
» Models in Knowledge Management
Sort
View
TISSEC
2008
202views more  TISSEC 2008»
15 years 4 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
JCIT
2007
159views more  JCIT 2007»
15 years 4 months ago
GDIA: A Scalable Grid Infrastructure for Data Intensive Applications
The applications in many scientific fields, like bioinformatics and high-energy physics etc, increasingly demand the computing infrastructures can provide more computing power and...
Xiaohui Wei, Zhaohui Ding, Wilfred W. Li, Osamu Ta...
JCM
2007
143views more  JCM 2007»
15 years 4 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
TOCS
2008
146views more  TOCS 2008»
15 years 4 months ago
Bigtable: A Distributed Storage System for Structured Data
Bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers. Many...
Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C...
TOSEM
2008
117views more  TOSEM 2008»
15 years 4 months ago
Power laws in software
e than previously established, appearing at various levels of abstraction, in diverse systems and languages. The implications of this phenomenon cover various aspects of software e...
Panagiotis Louridas, Diomidis Spinellis, Vasileios...
« Prev « First page 2544 / 2765 Last » Next »