Sciweavers

3971 search results - page 770 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
PERCOM
2010
ACM
13 years 6 months ago
Towards the Web of Things: Using DPWS to bridge isolated OSGi platforms
Abstract—Bringing heterogeneous devices like industrial machines, home appliances, and wireless sensors into the Web assumes the usage of well-defined standards and protocols. O...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
CDC
2010
IEEE
215views Control Systems» more  CDC 2010»
13 years 2 months ago
Consensus with robustness to outliers via distributed optimization
Over the past few years, a number of distributed algorithms have been developed for integrating the measurements acquired by a wireless sensor network. Among them, average consensu...
Jixin Li, Ehsan Elhamifar, I.-Jeng Wang, Ren&eacut...
GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
13 years 8 months ago
A formal performance modeling framework for bio-inspired ad hoc routing protocols
Bio-inspired ad hoc routing is an active area of research. The designers of these algorithms predominantly evaluate the performance of their protocols with the help of simulation ...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 9 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray