Sciweavers

65 search results - page 5 / 13
» A Survey of Operations Research Models and Applications in H...
Sort
View
WSNA
2003
ACM
14 years 23 days ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
IESA
2007
13 years 9 months ago
Application Development with Virtual Teams: Models and Metrics
Increased performance is the key reason for developing software with virtual teams but the research efforts to date are limited. Difficulties for a formal, generic approach are mul...
D. Radoiu
ESORICS
2009
Springer
14 years 2 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
IEEEIAS
2009
IEEE
14 years 2 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
ALIFE
2006
13 years 7 months ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho