Sciweavers

1739 search results - page 290 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
SWS
2004
ACM
15 years 10 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ADAEUROPE
2004
Springer
15 years 10 months ago
PolyORB: A Schizophrenic Middleware to Build Versatile Reliable Distributed Applications
Abstract. The development of real-time distributed applications requires middleware providing both reliability and performance. Middleware must be adaptable to meet application req...
Thomas Vergnaud, Jérôme Hugues, Laure...
IAW
2003
IEEE
15 years 9 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
ICDCSW
2003
IEEE
15 years 9 months ago
Gateway: A Message Hub with Store-and-Forward Messaging in Mobile Networks
To obtain good performance in messaging over mobile networks, we have developed a Gateway. Gateway is a message hub that transmits information using store-and-forward messaging an...
Eiko Yoneki, Jean Bacon
MDM
2010
Springer
194views Communications» more  MDM 2010»
15 years 6 months ago
Timing and Radius Considerations for Maintaining Connectivity QoS
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...