Sciweavers

113 search results - page 13 / 23
» When Simulation Meets Antichains
Sort
View
ICC
2007
IEEE
169views Communications» more  ICC 2007»
15 years 3 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho
67
Voted
INFOCOM
2007
IEEE
15 years 3 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
73
Voted
CISSE
2007
Springer
15 years 3 months ago
Resource Allocation in Market-based Grids Using a History-based Pricing Mechanism
In an ad-hoc Grid environment where producers and consumers compete for providing and employing resources, trade handling in a fair and stable way is a challenging task. Dynamic ch...
Behnaz Pourebrahimi, S. Arash Ostadzadeh, Koen Ber...
ICDCS
2006
IEEE
15 years 3 months ago
Adaptive Control of Extreme-scale Stream Processing Systems
Abstract— Distributed stream processing systems offer a highly scalable and dynamically configurable platform for time-critical applications ranging from real-time, exploratory ...
Lisa Amini, Navendu Jain, Anshul Sehgal, Jeremy Si...
WECWIS
2006
IEEE
139views ECommerce» more  WECWIS 2006»
15 years 3 months ago
WSC-06: The Web Service Challenge
In today’s businesses, there is a trend that serviceoriented architecture (SOA) is evolving into a popular architectural paradigm for IT infrastructure. SOA allows companies’ ...
M. Brian Blake, William Kwok-Wai Cheung, Michael C...