Sciweavers

257 search results - page 32 / 52
» Using Replication and Partitioning to Build Secure Distribut...
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 2 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
ICDCS
2012
IEEE
13 years 4 months ago
MOVE: A Large Scale Keyword-Based Content Filtering and Dissemination System
—The Web 2.0 era is characterized by the emergence of a very large amount of live content. A real time and finegrained content filtering approach can precisely keep users upto-...
Weixiong Rao, Lei Chen 0002, Pan Hui, Sasu Tarkoma
OOPSLA
2010
Springer
15 years 11 days ago
Tribal ownership
Tribal Ownership unifies class nesting and object ownership. Tribal Ownership is based on Tribe, a language with nested classes and object families. In Tribal Ownership, a progra...
Nicholas R. Cameron, James Noble, Tobias Wrigstad
KER
2006
70views more  KER 2006»
15 years 1 months ago
A theoretical inter-organizational trust-based security model
This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security...
Henry Hexmoor, Seth Wilson, Sandeep Bhattaram
GRID
2005
Springer
15 years 7 months ago
Automatic clustering of grid nodes
— In a grid-computing environment, resource selection and scheduling depend on the network topology connecting the computation nodes. This paper presents a method to hierarchical...
Qiang Xu, Jaspal Subhlok