Sciweavers

274 search results - page 44 / 55
» Improving vulnerability discovery models
Sort
View
JCP
2008
119views more  JCP 2008»
13 years 7 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
WWW
2007
ACM
14 years 8 months ago
A kernel based structure matching for web services search
This paper describes a kernel based Web Services (abbreviated as service) matching mechanism for service discovery and integration. The matching mechanism tries to exploit the lat...
Yu Jianjun, Guo Shengmin, Su Hao, Zhang Hui, Xu Ke
APSCC
2009
IEEE
14 years 2 months ago
On analyzing and specifying concerns for data as a service
—Providing data as a service has not only fostered the access to data from anywhere at anytime but also reduced the cost of investment. However, data is often associated with var...
Hong Linh Truong, Schahram Dustdar
ICC
2008
IEEE
153views Communications» more  ICC 2008»
14 years 2 months ago
MARIA: Interference-Aware Admission Control and QoS Routing in Wireless Mesh Networks
Abstract— Interference among concurrent transmissions complicates QoS provisioning for multimedia applications in wireless mesh networks. In this paper we propose MARIA (Mesh Adm...
Xiaolin Cheng, Prasant Mohapatra, Sung-Ju Lee, Suj...
ANSS
2005
IEEE
14 years 1 months ago
Route Recovery Mechanisms for Ad Hoc Networks Equipped with Switched Single Beam Antennas
In this paper we propose a novel three phase route recovery mechanism for routing over switched single beam directional antennas. We enhance the popular Dynamic Source Routing (DS...
Tarun Joshi, Hrishikesh Gossain, Carlos de M. Cord...