Sciweavers

637 search results - page 101 / 128
» The Case for Abstracting Security Policies
Sort
View
PAKM
2004
15 years 3 months ago
XAROP: A Midterm Report in Introducing a Decentralized Semantics-Based Knowledge Sharing Application
Abstract. Knowledge management solutions relying on central repositories sometimes have not met expectations, since users often create knowledge ad-hoc using their individual vocab...
Christoph Tempich, Marc Ehrig, Christiaan Fluit, P...
115
Voted
HIPC
2004
Springer
15 years 7 months ago
iSAN - An Intelligent Storage Area Network Architecture
This paper describes the motivation, architecture and implementation of iSAN, an “intelligent” storage area network. The main contributions of this work are: (1) how to archite...
Ganesh M. Narayan, K. Gopinath
MASCOTS
2007
15 years 3 months ago
Multiobjective Analysis in Wireless Mesh Networks
Abstract— Wireless Mesh Networks are a scalable and costeffective solution for next-generation wireless networking. In the present work, we consider the Round Weighting Problem (...
Cristiana Gomes, Gurvan Huiban
IJWIN
2006
209views more  IJWIN 2006»
15 years 1 months ago
On Connected Multiple Point Coverage in Wireless Sensor Networks
Abstract-- We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a s...
Shuhui Yang, Fei Dai, Mihaela Cardei, Jie Wu, Floy...
106
Voted
CANS
2009
Springer
121views Cryptology» more  CANS 2009»
15 years 8 months ago
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N. W...
Marc Joye