Sciweavers

322 search results - page 53 / 65
» Entity Authentication and Key Distribution
Sort
View
FASE
2010
Springer
13 years 11 months ago
A Process to Effectively Identify "Guilty" Performance Antipatterns
Abstract. The problem of interpreting the results of software performance analysis is very critical. Software developers expect feedbacks in terms of architectural design alternati...
Vittorio Cortellessa, Anne Martens, Ralf Reussner,...
PERCOM
2011
ACM
13 years 5 days ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
CN
2006
74views more  CN 2006»
13 years 8 months ago
OMNI: An efficient overlay multicast infrastructure for real-time applications
We consider an overlay architecture (called OMNI) where service providers deploy a set of service nodes (called MSNs) in the network to efficiently implement media-streaming appli...
Suman Banerjee, Christopher Kommareddy, Koushik Ka...
SEUS
2008
IEEE
14 years 2 months ago
Delay-Aware Mobile Transactions
In the expanding e-society, mobile embedded systems are increasingly used to support transactions such as for banking, stock or database applications. Such systems entail a range o...
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
14 years 1 months ago
Trust Estimation in autonomic networks: a statistical mechanics approach
— Trust management, broadly intended as the ability to maintain belief relationship among entities, is recognized as a fundamental security challenge for autonomous and selforgan...
Stefano Ermon, Luca Schenato, Sandro Zampieri