Sciweavers

1683 search results - page 142 / 337
» A Needed Narrowing Strategy
Sort
View
CSSE
2008
IEEE
15 years 10 months ago
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker
Abstract: The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, securit...
Prabhu Shankar Kaliappan, Hartmut Koenig, Vishnu K...
121
Voted
HICSS
2008
IEEE
127views Biometrics» more  HICSS 2008»
15 years 10 months ago
Future e-Government Research: 13 Research Themes Identified in the eGovRTD2020 Project
E-government research has become a recognized research domain and many policies and strategies are formulated for e-government implementations. Most of these target the next few y...
Maria Wimmer, Cristiano Codagnone, Marijn Janssen
148
Voted
ICCCN
2008
IEEE
15 years 10 months ago
Instrumentation and Analysis of MPI Queue Times on the SeaStar High-Performance Network
—Understanding the communication behavior and network resource usage of parallel applications is critical to achieving high performance and scalability on systems with tens of th...
Ron Brightwell, Kevin T. Pedretti, Kurt B. Ferreir...
WIMOB
2008
IEEE
15 years 10 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...
EDOC
2007
IEEE
15 years 10 months ago
Business and IT Alignment with SEAM for Enterprise Architecture
To align an IT system with an organization’s needs, it is necessary to understand the organization’s position within its environment as well as its internal configuration. In ...
Alain Wegmann, Gil Regev, Irina Rychkova, Lam-Son ...