Sciweavers

1177 search results - page 152 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
117
Voted
MSWIM
2006
ACM
15 years 9 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
110
Voted
UIST
2000
ACM
15 years 8 months ago
SATIN: a toolkit for informal ink-based applications
Software support for making effective pen-based applications is currently rudimentary. To facilitate the creation of such applications, we have developed SATIN, a Java-based toolk...
Jason I. Hong, James A. Landay
ENTCS
2010
118views more  ENTCS 2010»
15 years 1 months ago
Systematic Refinement of Performance Models for Concurrent Component-based Systems
Model-driven performance prediction methods require detailed design models to evaluate the performance of software systems during early development stages. However, the complexity...
Lucia Kapová, Steffen Becker
DMIN
2009
180views Data Mining» more  DMIN 2009»
15 years 1 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
125
Voted
GLVLSI
2009
IEEE
146views VLSI» more  GLVLSI 2009»
15 years 7 months ago
A reconfigurable stochastic architecture for highly reliable computing
Mounting concerns over variability, defects and noise motivate a new approach for integrated circuits: the design of stochastic logic, that is to say, digital circuitry that opera...
Xin Li, Weikang Qian, Marc D. Riedel, Kia Bazargan...