Sciweavers

11921 search results - page 2366 / 2385
» Community Information Management
Sort
View
IJSN
2008
145views more  IJSN 2008»
13 years 7 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JSAC
2008
101views more  JSAC 2008»
13 years 7 months ago
Sequential Bandwidth and Power Auctions for Distributed Spectrum Sharing
We study a sequential auction for sharing a wireless resource (bandwidth or power) among competing transmitters. The resource is assumed to be managed by a spectrum broker (auction...
Junjik Bae, Eyal Beigman, Randall A. Berry, Michae...
JUCS
2008
161views more  JUCS 2008»
13 years 7 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...
MIS
2008
Springer
149views Multimedia» more  MIS 2008»
13 years 7 months ago
Home-Explorer: Ontology-based physical artifact search and hidden object detection system
A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses s...
Bin Guo, Satoru Satake, Michita Imai
« Prev « First page 2366 / 2385 Last » Next »