Sciweavers

831 search results - page 118 / 167
» A Security Concept for OLAP
Sort
View
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 10 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
JNW
2008
99views more  JNW 2008»
13 years 10 months ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 10 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
SP
2008
IEEE
113views Security Privacy» more  SP 2008»
13 years 10 months ago
Inter-operating grids through Delegated MatchMaking
The grid vision of a single computing utility has yet to materialize: while many grids with thousands of processors each exist, most work in isolation. An important obstacle for t...
Alexandru Iosup, Todd Tannenbaum, Matthew Farrelle...
SP
2002
IEEE
128views Security Privacy» more  SP 2002»
13 years 9 months ago
Fitting hidden Markov models to psychological data
Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive stat...
Ingmar Visser, Maartje E. J. Raijmakers, Peter C. ...