Sciweavers

247 search results - page 37 / 50
» A Self-healing Key Distribution Scheme with Novel Properties
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
MOBIHOC
2005
ACM
14 years 8 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
VTC
2007
IEEE
135views Communications» more  VTC 2007»
14 years 3 months ago
MBER Turbo Multiuser Beamforming Aided QPSK Receiver Design Using EXIT Chart Analysis
Abstract— This paper studies the mutual information transfer characteristics of a novel iterative soft interference cancellation (SIC) aided beamforming receiver designed for qua...
Shuang Tan, Sheng Chen, Lajos Hanzo
FORMATS
2007
Springer
14 years 22 days ago
Combining Formal Verification with Observed System Execution Behavior to Tune System Parameters
Resource limited DRE (Distributed Real-time Embedded) systems can benefit greatly from dynamic adaptation of system parameters. We propose a novel approach that employs iterative t...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
USENIX
2007
13 years 11 months ago
Energy Management for Hypervisor-Based Virtual Machines
Current approaches to power management are based on operating systems with full knowledge of and full control over the underlying hardware; the distributed nature of multi-layered...
Jan Stoess, Christian Lang, Frank Bellosa