Sciweavers

554 search results - page 56 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
XPU
2004
Springer
14 years 1 months ago
An Agile Approach to a Legacy System
We describe how a small, successful, self-selected XP team approached a seemingly intractable problem with panache, flair and immodesty. We rewrote a legacy application by deliver...
Chris Stevenson, Andy Pols
JSAC
2006
127views more  JSAC 2006»
13 years 7 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
VIS
2006
IEEE
128views Visualization» more  VIS 2006»
14 years 9 months ago
Hierarchy-based 3-D Visualization of Homologous Gene Expression across Different Organisms
With the explosive growth of proteomic and expression data of homologous genes, it becomes necessary to explore new methods to visualize and analyze related gene expression data t...
Li Jin, Karl V. Steiner, Carl J. Schmidt, Keith...
RTSS
2003
IEEE
14 years 29 days ago
Adaptive Coherency Maintenance Techniques for Time-Varying Data
Often, data used in on-line decision making (for example, in determining how to react to changes in process behavior, traffic flow control, etc.) is dynamic in nature and hence ...
Ratul kr. Majumdar, Kannan M. Moudgalya, Krithi Ra...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 2 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...