Sciweavers

6164 search results - page 920 / 1233
» Teaching Computer Security
Sort
View
ICDCS
2007
IEEE
15 years 11 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu
IMSCCS
2007
IEEE
15 years 11 months ago
Linear Correlation Analysis of Numeric Attributes for Government Data
To analyze the linear correlations of numeric attributes of government data, this paper proposes a method based on the clustering algorithm. A clustering method is adopted to prun...
Ying Chen, Guochang Gu, Tian-yang Lv, Shaobin Huan...
APNOMS
2007
Springer
15 years 11 months ago
Standby Power Control Architecture in Context-Aware Home Networks
Standby power is the energy consumed by appliances when they are not performing their main functions or when they are switched off. In this paper, we propose a Host-Agent based sta...
Joon Heo, Jihyuk Heo, Choong Seon Hong, Seok Bong ...
132
Voted
COREGRID
2007
Springer
15 years 11 months ago
Adding metadata to Orc to support reasoning about grid programs
Abstract Following earlier work demonstrating the utility of Orc as a means of specifying and reasoning about grid applications we propose the enhancement of such specifications w...
Marco Aldinucci, Marco Danelutto, Peter Kilpatrick
ECUMN
2007
Springer
15 years 11 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...