Sciweavers

48 search results - page 8 / 10
» sec 2008
Sort
View
IPPS
2008
IEEE
14 years 23 days ago
Providing security to the Desktop Data Grid
Volunteer Computing is becoming a new paradigm not only for the Computational Grid, but also for institutions using production-level Data Grids because of the enormous storage pot...
Jesus Luna, Michail Flouris, Manolis Marazakis, An...
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
14 years 22 days ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
INFOCOM
2008
IEEE
14 years 23 days ago
APL: Autonomous Passive Localization for Wireless Sensors Deployed in Road Networks
Abstract—In road networks, sensors are deployed sparsely (hundreds of meters apart) to save costs. This makes the existing localization solutions based on the ranging be ineffect...
Jaehoon Jeong, Shuo Guo, Tian He, David Du
SASO
2008
IEEE
14 years 22 days ago
Bottom-Up Self-Organization of Unpredictable Demand and Supply under Decentralized Power Management
In the DEZENT1 project we had established a distributed base model for negotiating electric power from widely distributed (renewable) power sources on multiple levels in successio...
Horst F. Wedde, Sebastian Lehnhoff, Christian Reht...
FDTC
2008
Springer
87views Cryptology» more  FDTC 2008»
13 years 8 months ago
Silicon-level Solutions to Counteract Passive and Active Attacks
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with the help of STMicroelectronics. The purpose of ...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...