Sciweavers

859 search results - page 148 / 172
» The Changing Face of Cryptography
Sort
View
MOBIHOC
2007
ACM
15 years 9 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
ICSE
2005
IEEE-ACM
15 years 9 months ago
Deciding what to design: closing a gap in software engineering education
Software has jumped "out of the box" ? it controls critical systems, pervades business and commerce, and infuses entertainment, communication, and other everyday activiti...
Mary Shaw, James D. Herbsleb, Ipek Ozkaya
WOSP
2010
ACM
15 years 4 months ago
Agile resource management in a virtualized data center
In this paper we develop, implement and evaluate an approach to quickly reassign resources for a virtualized utility computing platform. The approach provides this platform agilit...
Wei Zhang, Hangwei Qian, Craig E. Wills, Michael R...
TMA
2010
Springer
166views Management» more  TMA 2010»
15 years 4 months ago
Understanding and Preparing for DNS Evolution
The Domain Name System (DNS) is a crucial component of today’s Internet. The top layer of the DNS hierarchy (the root nameservers) is facing dramatic changes: cryptographically s...
Sebastian Castro, Min Zhang, Wolfgang John, Duane ...
91
Voted
ICMT
2009
Springer
15 years 4 months ago
A Simple Game-Theoretic Approach to Checkonly QVT Relations
Abstract. The QVT Relations (QVT-R) transformation language allows the definition of bidirectional model transformations, which are required in cases where a two (or more) models ...
Perdita Stevens