Sciweavers

86 search results - page 14 / 18
» A Schema Based Approach to Valid XML Access Control
Sort
View
JCM
2008
196views more  JCM 2008»
13 years 7 months ago
An Energy Optimization Protocol Based on Cross-Layer for Wireless Sensor Networks
Survivability is one of the critical issues and the most important research topics in the fields of wireless sensor networks (WSNs). Energy efficiency is one of the determining fac...
Yuebin Bai, Shujuan Liu, Mo Sha, Yang Lu, Cong Xu
EMSOFT
2006
Springer
13 years 11 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
COMPSAC
2009
IEEE
13 years 11 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
ICMLA
2009
14 years 4 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
GLOBECOM
2009
IEEE
14 years 2 months ago
MAC Protocol Engine for Sensor Networks
—We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based...
Sinem Coleri Ergen, Piergiuseppe Di Marco, Carlo F...