Sciweavers

858 search results - page 106 / 172
» Maintaining Consistency of Data in Mobile Distributed Enviro...
Sort
View
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 11 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
15 years 11 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay
ICAS
2009
IEEE
126views Robotics» more  ICAS 2009»
15 years 8 months ago
Heterogeneous QoS Resource Manager with Prediction
As long as computers continue to get more CPU processing power, data centers need to optimize their power usage. We can do this and maintain the same complexity level as before by...
Ramon Nou, Jordi Torres
MSWIM
2005
ACM
15 years 10 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 10 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch