Sciweavers

3686 search results - page 656 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
ISORC
2002
IEEE
14 years 23 days ago
Service Differentiation in Real-Time Main Memory Databases
The demand for real-time database services has been increasing recently. Examples include sensor data fusion, stock trading, decision support, web information services, and data-i...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
CONEXT
2007
ACM
13 years 11 months ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
CCS
2008
ACM
13 years 9 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
FLAIRS
2004
13 years 9 months ago
Agent-based Players for a First-person Entertainment-based Real-time Artificial Environment
The necessity for improved players and opponents in firstperson entertainment-based real-time artificial environments has inspired our research into artificial game players. We em...
G. Michael Youngblood, Lawrence B. Holder
FLAIRS
2006
13 years 9 months ago
Modeling Bayesian Networks for Autonomous Diagnosis of Web Services
We took an innovative approach to service level management for network enterprise systems by using integrated monitoring, diagnostics, and adaptation services in a service-oriente...
Haiqin Wang, Guijun Wang, Alice Chen, Changzhou Wa...