Sciweavers

3482 search results - page 636 / 697
» Designing for security
Sort
View
COMPUTER
2007
123views more  COMPUTER 2007»
13 years 10 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
CONCURRENCY
2007
83views more  CONCURRENCY 2007»
13 years 10 months ago
Enabling community access to TeraGrid visualization resources
Visualization is an important part of the data analysis process. Many researchers, however, do not have access to the resources required to do visualization effectively for large ...
Justin Binns, Jonathan DiCarlo, Joseph A. Insley, ...
MAGS
2008
169views more  MAGS 2008»
13 years 10 months ago
ACVisualizer: A visualization tool for APi-calculus
Process calculi are mathematical tools used for modeling and analyzing the structure and behavior of reactive systems. One such calculus, called APi-calculus (an extension to Pi-ca...
Raheel Ahmad, Shahram Rahimi
JSAC
2006
111views more  JSAC 2006»
13 years 10 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
MMS
2006
13 years 10 months ago
Information assimilation framework for event detection in multimedia surveillance systems
Most multimedia surveillance and monitoring systems nowadays utilize multiple types of sensors to detect events of interest as and when they occur in the environment. However, due...
Pradeep K. Atrey, Mohan S. Kankanhalli, Ramesh Jai...