Sciweavers

2940 search results - page 497 / 588
» Behavioral Constraints for Services
Sort
View
WETICE
2005
IEEE
14 years 1 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
SASN
2005
ACM
14 years 1 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
JIT
2005
Springer
115views Database» more  JIT 2005»
14 years 1 months ago
Dynamic Aspect Weaver Family for Family-based Adaptable Systems
: Complex software systems, like operating systems and middleware, have to cope with a broad range of requirements as well as strict resource constraints. Family-based software dev...
Wasif Gilani, Olaf Spinczyk
ICCSA
2004
Springer
14 years 1 months ago
A Market-Based Scheduler for JXTA-Based Peer-to-Peer Computing System
Peer-to-Peer (P2P) computing is said to be the next wave of computing after client-server and web-based computing. It provides an opportunity to harness a lot of idle peer-resource...
Tan Tien Ping, Gian Chand Sodhy, Chan Huah Yong, F...
DATE
2003
IEEE
115views Hardware» more  DATE 2003»
14 years 1 months ago
Embedded Software in Digital AM-FM Chipset
The new standard DRM for digital radio broadcast in AM band requires integrated devices for radio receivers at low cost and very low power consumption. A chipset is currently desi...
Michel Sarlotte, Bernard Candaele, J. Quevremont, ...