Sciweavers

1066 search results - page 28 / 214
» Applying Architectural Hybridization in Networked Embedded S...
Sort
View
VIROLOGY
2010
162views more  VIROLOGY 2010»
15 years 2 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
DAC
2007
ACM
16 years 5 months ago
Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors
Minimizing power consumption is vitally important in embedded system design; power consumption determines battery lifespan. Ultralow-power designs may even permit embedded systems...
Changyun Zhu, Zhenyu (Peter) Gu, Li Shang, Robert ...
MA
1999
Springer
110views Communications» more  MA 1999»
15 years 8 months ago
Hive: Distributed Agents for Networking Things
Hive is a distributed agents platform, a decentralized system for building applications by networking local system resources. This paper presents the architecture of Hive, concent...
Nelson Minar, Matthew Gray, Oliver Roup, Raffi Kri...
WSNA
2003
ACM
15 years 9 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
DSN
2009
IEEE
15 years 10 months ago
Data management mechanisms for embedded system gateways
It is becoming increasingly common to connect traditional embedded system networks to the Internet for remote monitoring, high-level control and integration. It is necessary to pr...
Justin Ray, Philip Koopman