Sciweavers

1601 search results - page 266 / 321
» A Security Architecture for Computational Grids
Sort
View
MIDDLEWARE
2007
Springer
14 years 3 months ago
Promoting levels of openness on component-based adaptable middleware
It is widely accepted that middleware is an important architectural element which facilitates the development of software systems. In this paper we propose a novel approach for de...
Tarcisio da Rocha, Anna-Brith Arntsen, Arne Ketil ...
DAC
2006
ACM
14 years 2 months ago
The zen of nonvolatile memories
Silicon technology based nonvolatile memories (NVM) have achieved widespread adoption for code and data storage applications. In the last 30 years, the traditional floating gate ...
Erwin J. Prinz
AINA
2010
IEEE
13 years 19 days ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
DAC
2004
ACM
14 years 10 months ago
Proxy-based task partitioning of watermarking algorithms for reducing energy consumption in mobile devices
Digital watermarking is a process that embeds an imperceptible signature or watermark in a digital file containing audio, image, text or video data. The watermark is later used to...
Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Ni...
WISEC
2010
ACM
13 years 9 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...