Sciweavers

64 search results - page 8 / 13
» Network virtualization: a view from the bottom
Sort
View
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
WCNC
2008
IEEE
14 years 2 months ago
Cooperative Communications Using Scalable, Medium Block-length LDPC Codes
Abstract— Cooperative communications has received increasing attention in recent years because of the ubiquity of wireless devices. Each year more mobile computing devices enter ...
Marjan Karkooti, Joseph R. Cavallaro
AIR
2005
158views more  AIR 2005»
13 years 7 months ago
Review on Computational Trust and Reputation Models
The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and perfor...
Jordi Sabater, Carles Sierra
GLOBECOM
2006
IEEE
14 years 1 months ago
Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks
— Sensing coverage is an important issue for sensor networks, since it is viewed as one of the critical measures of performance offered by a sensor network. The design of a routi...
Yuh-Ren Tsai
ICDCS
2007
IEEE
14 years 1 months ago
Fault Tolerance in Multiprocessor Systems Via Application Cloning
Record and Replay (RR) is a software based state replication solution designed to support recording and subsequent replay of the execution of unmodified applications running on mu...
Philippe Bergheaud, Dinesh Subhraveti, Marc Vertes