Sciweavers

634 search results - page 106 / 127
» Secure time synchronization service for sensor networks
Sort
View
92
Voted
EUROPAR
2006
Springer
15 years 1 months ago
Context Awareness: An Experiment with Hoarding
Abstract. Computer mobility allows people to use computers in varied and changing environments. This variability forces applications to adapt thus requiring awareness of the comput...
João Garcia, Luís Veiga, Paulo Ferre...
NDSS
2008
IEEE
15 years 4 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
GLOBECOM
2007
IEEE
15 years 4 months ago
Hierarchical Provisioning Algorithm for Virtual Private Networks Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. Two models were proposed for the service provisioning i...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja
ACSAC
2002
IEEE
15 years 2 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
85
Voted
ECEH
2006
162views Healthcare» more  ECEH 2006»
14 years 11 months ago
Mobile Health Care: Towards a Commercialization of Research Results
: During the last fours years a consortium of universities, hospitals and commercial companies has been working together for the development of innovative systems and services for ...
Dimitri Konstantas, Richard Bults, Aart van Halter...