Sciweavers

1040 search results - page 109 / 208
» Resource Usage Verification
Sort
View
ICCS
2007
Springer
15 years 9 months ago
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
Tran Thanh Dai, Choong Seon Hong
CCGRID
2006
IEEE
15 years 9 months ago
The Computational and Storage Potential of Volunteer Computing
“Volunteer computing” uses Internet-connected computers, volunteered by their owners, as a source of computing power and storage. This paper studies the potential capacity of ...
David P. Anderson, Gilles Fedak
COMSWARE
2006
IEEE
15 years 9 months ago
FACTS - A rule-based middleware architecture for wireless sensor networks
ing a middleware abstraction layer into wireless sensor networks is a widely accepted solution to facilitate application programming and allow network organization. In this paper,...
Kirsten Terfloth, Georg Wittenburg, Jochen H. Schi...
112
Voted
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 9 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
ICSEA
2006
IEEE
15 years 9 months ago
Extracting Simulation Models from Complex Embedded Real-Time Systems
A modeling process is presented for extracting timingaccurate simulation models from complex embedded realtime systems. The process is supported by two complementary methods for t...
Johan Andersson, Joel Huselius, Christer Norstr&ou...