Sciweavers

2880 search results - page 413 / 576
» context 2007
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ACSAC
2007
IEEE
15 years 11 months ago
An Overview of the Annex System
This paper describes the security and network architecture of the Annex system, a family of technologies for secure and pervasive communication and information processing that we ...
Duncan A. Grove, Toby C. Murray, C. A. Owen, Chris...
ACSC
2007
IEEE
15 years 11 months ago
On Inferences of Full Hierarchical Dependencies
Full hierarchical dependencies (FHDs) constitute a large class of relational dependencies. A relation exhibits an FHD precisely when it can be decomposed into at least two of its ...
Sven Hartmann, Sebastian Link
150
Voted
ACSD
2007
IEEE
102views Hardware» more  ACSD 2007»
15 years 11 months ago
Sensor Minimization Problems with Static or Dynamic Observers for Fault Diagnosis
We study sensor minimization problems in the context of fault diagnosis. Fault diagnosis consists in synthesizing a diagnoser that observes a given plant and identifies faults in...
Franck Cassez, Stavros Tripakis, Karine Altisen
134
Voted
AINA
2007
IEEE
15 years 11 months ago
Reliability-Driven Scheduling of Periodic Tasks in Heterogeneous Real-Time Systems
In this paper we comprehensively investigated the issue of reliability-driven real-time scheduling for periodic tasks in heterogeneous systems. First, we built a reliability model...
Wei Luo, Xiao Qin, Kiranmai Bellam