Sciweavers

526 search results - page 85 / 106
» Increase honeypot security through data analysis
Sort
View
RTCSA
2003
IEEE
15 years 10 months ago
Real-Time Disk Scheduling with On-Disk Cache Conscious
Previous real-time disk scheduling algorithms assume that each disk request incurs a disk mechanical operation and only consider how to move the disk head under real-time constrain...
Hsung-Pin Chang, Ray-I Chang, Wei Kuan Shih, Ruei-...
IMC
2007
ACM
15 years 6 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
DAC
2007
ACM
16 years 5 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
ESA
2006
Springer
140views Algorithms» more  ESA 2006»
15 years 8 months ago
Latency Constrained Aggregation in Sensor Networks
A sensor network consists of sensing devices which may exchange data through wireless communication. A particular feature of sensor networks is that they are highly energy constrai...
Luca Becchetti, Peter Korteweg, Alberto Marchetti-...
EJWCN
2010
118views more  EJWCN 2010»
14 years 11 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang