Sciweavers

257 search results - page 32 / 52
» Using Replication and Partitioning to Build Secure Distribut...
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 10 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
ICDCS
2012
IEEE
13 years 10 days ago
MOVE: A Large Scale Keyword-Based Content Filtering and Dissemination System
—The Web 2.0 era is characterized by the emergence of a very large amount of live content. A real time and finegrained content filtering approach can precisely keep users upto-...
Weixiong Rao, Lei Chen 0002, Pan Hui, Sasu Tarkoma
OOPSLA
2010
Springer
14 years 8 months ago
Tribal ownership
Tribal Ownership unifies class nesting and object ownership. Tribal Ownership is based on Tribe, a language with nested classes and object families. In Tribal Ownership, a progra...
Nicholas R. Cameron, James Noble, Tobias Wrigstad
KER
2006
70views more  KER 2006»
14 years 10 months ago
A theoretical inter-organizational trust-based security model
This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security...
Henry Hexmoor, Seth Wilson, Sandeep Bhattaram
GRID
2005
Springer
15 years 3 months ago
Automatic clustering of grid nodes
— In a grid-computing environment, resource selection and scheduling depend on the network topology connecting the computation nodes. This paper presents a method to hierarchical...
Qiang Xu, Jaspal Subhlok