Sciweavers

2099 search results - page 401 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
98
Voted
MOBISYS
2010
ACM
15 years 11 hour ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
63
Voted
ICRA
2003
IEEE
102views Robotics» more  ICRA 2003»
15 years 3 months ago
Two-dimensional signal transmission technology for robotics
The forms of communication available now are categorized into the one or three dimensional. One dimensional communication includes metal wires and optical fibers in which the elec...
Hiroyuki Shinoda, Naoya Asamura, Mitsuhiro Hakozak...
POLICY
2004
Springer
15 years 3 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade
HAIS
2010
Springer
15 years 2 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...
82
Voted
SIGMETRICS
1997
ACM
103views Hardware» more  SIGMETRICS 1997»
15 years 1 months ago
Performance Issues of Enterprise Level Web Proxies
Enterprise level web proxies relay world-wide web traffic between private networks and the Internet. They improve security, save network bandwidth, and reduce network latency. Wh...
Carlos Maltzahn, Kathy J. Richardson, Dirk Grunwal...