Sciweavers

236 search results - page 31 / 48
» Application of RT-DEVS in military
Sort
View
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 3 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
ANTSW
2006
Springer
14 years 2 months ago
An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks
Abstract. Wireless Sensor Networks are characterized by having specific requirements such as limited energy availability, low memory and reduced processing power. On the other hand...
Tiago Camilo, Carlos Carreto, Jorge Sá Silv...
DMSN
2006
ACM
14 years 2 months ago
Processing proximity queries in sensor networks
Sensor networks are often used to perform monitoring tasks, such as in animal or vehicle tracking and in surveillance of enemy forces in military applications. In this paper we in...
Yannis Kotidis
ASWEC
2001
IEEE
14 years 2 months ago
Extending the UML for Designing Jack Agents
Mainstreaming and industrialising agent technologies requires suitable methodological and technological support for the various engineering activities associated with managing the...
Michael Papasimeon, Clinton Heinze
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
14 years 1 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...