Sciweavers

207 search results - page 12 / 42
» Automated Protocol Implementations Based on Activity Threads
Sort
View
IPPS
2007
IEEE
14 years 1 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
PERCOM
2010
ACM
13 years 6 months ago
Towards IEEE 802.15.4e: A study of performance aspects
—We discuss the applicability of IEEE 802.15.4 for application in industrial automation. Based on the specific requirements in this field, especially w.r.t. real-time operation...
Feng Chen, Reinhard German, Falko Dressler
CCS
2009
ACM
14 years 2 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
RTAS
2011
IEEE
12 years 11 months ago
ARCH: Practical Channel Hopping for Reliable Home-Area Sensor Networks
Abstract—Home area networks (HANs) promise to enable sophisticated home automation applications such as smart energy usage and assisted living. However, recent empirical study of...
Mo Sha, Gregory Hackmann, Chenyang Lu
WECWIS
2003
IEEE
82views ECommerce» more  WECWIS 2003»
14 years 24 days ago
Property Propagation Rules for Prioritizing and Synchronizing Trading Activities
With the growing number of marketplaces and trading partners in the e–commerce environment, software tools designed to act on behalf of human traders are increasingly used to au...
Yain-Whar Si, David Edmond, Arthur H. M. ter Hofst...