Sciweavers

1530 search results - page 273 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
CCS
2009
ACM
14 years 3 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
MIDDLEWARE
2007
Springer
14 years 2 months ago
A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications
Abstract. The success of Internet telephony services like Skype illustrates the feasibility of utilizing unstructured Peer-to-Peer (P2P) networks as an economical platform for supp...
Jianjun Zhang, Ling Liu, Lakshmish Ramaswamy, Gong...
SENSYS
2005
ACM
14 years 2 months ago
Intelligent light control using sensor networks
Increasing user comfort and reducing operation costs have always been two primary objectives of building operations and control strategies. Current building control strategies are...
Vipul Singhvi, Andreas Krause, Carlos Guestrin, Ja...
CCS
2001
ACM
14 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
AUTONOMICS
2007
ACM
14 years 19 days ago
A framework to support multiple reconfiguration strategies
Self-management is a key feature of autonomic systems. This often demands the dynamic reconfiguration of a distributed application. An important issue in the reconfiguration proce...
Liliana Rosa, Luís Rodrigues, Antóni...