Sciweavers

1120 search results - page 94 / 224
» Securely sharing neuroimagery
Sort
View
133
Voted
CL
2007
Springer
15 years 20 days ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains
86
Voted
SIGOPS
2008
90views more  SIGOPS 2008»
15 years 18 days ago
Virtual servers and checkpoint/restart in mainstream Linux
Virtual private servers and application checkpoint and restart are two advanced operating system features which place different but related requirements on the way kernel-provided...
Sukadev Bhattiprolu, Eric W. Biederman, Serge E. H...
93
Voted
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
15 years 18 days ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
131
Voted
TIFS
2008
208views more  TIFS 2008»
15 years 17 days ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
SECON
2010
IEEE
14 years 10 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...