Sciweavers

575 search results - page 11 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 2 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
ESORICS
2008
Springer
13 years 9 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
HPDC
1998
IEEE
13 years 12 months ago
The NetLogger Methodology for High Performance Distributed Systems Performance Analysis
We describe a methodology that enables the real-time diagnosis of performance problems in complex high-performance distributed systems. The methodology includes tools for generati...
Brian Tierney, William E. Johnston, Brian Crowley,...
IPPS
2007
IEEE
14 years 1 months ago
Model-Driven Performance Analysis Methodology for Distributed Software Systems
Abstract— A key enabler of the recently popularized, assemblycentric development approach for distributed real-time software systems is QoS-enabled middleware, which provides reu...
Swapna S. Gokhale, Paul J. Vandal, Aniruddha S. Go...
COLCOM
2005
IEEE
14 years 1 months ago
Stochasticity of probabilistic systems: analysis methodologies case-study
We do a case study of two different analysis techniques for studying the stochastic behavior of a randomized system/algorithms: (i) The first approach can be broadly termed as a ...
Anwitaman Datta, Martin Hasler, Karl Aberer