Sciweavers

2275 search results - page 314 / 455
» A Deployment System for Pervasive Computing
Sort
View
PERCOM
2006
ACM
16 years 4 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
QSHINE
2009
IEEE
15 years 11 months ago
Using Sensor Networks to Measure Intensity in Sporting Activities
The deployment of sensor networks is both widespread and varied with more niche applications based on these networks. In the case study provided in this work, the network is provid...
Mark Roantree, Michael Whelan, Jie Shi, Niall Moyn...
RTSS
2008
IEEE
15 years 10 months ago
On the Scalability of Real-Time Scheduling Algorithms on Multicore Platforms: A Case Study
Multicore platforms are predicted to become significantly larger in the coming years. Given that real-time workloads will inevitably be deployed on such platforms, the scalabilit...
Björn B. Brandenburg, John M. Calandrino, Jam...
SRDS
2008
IEEE
15 years 10 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
IAT
2007
IEEE
15 years 10 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...