Sciweavers

6122 search results - page 1075 / 1225
» Securing network access in wireless sensor networks
Sort
View
ITNG
2010
IEEE
15 years 3 months ago
D-SeDGAM: A Dynamic Service Differentiation Based GTS Allocation Mechanism for IEEE 802.15.4 WSN
—The plethora of applications for Wireless Sensor Networks (WSN) has experienced significant growth in recent years. Every application has a different set of requirements and it ...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch
IPSN
2007
Springer
15 years 4 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
87
Voted
ITICSE
2009
ACM
15 years 4 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
MOBICOM
2006
ACM
15 years 4 months ago
Low-cost communication for rural internet kiosks using mechanical backhaul
Rural kiosks in developing countries provide a variety of services such as birth, marriage, and death certificates, electricity bill collection, land records, email services, and...
Aaditeshwar Seth, D. Kroeker, Matei A. Zaharia, Sh...
VIZSEC
2005
Springer
15 years 3 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
« Prev « First page 1075 / 1225 Last » Next »