Sciweavers

5269 search results - page 913 / 1054
» Operating system resource management
Sort
View
CSREASAM
2009
13 years 10 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
CN
2010
90views more  CN 2010»
13 years 9 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son
CORR
2008
Springer
187views Education» more  CORR 2008»
13 years 9 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
CORR
2006
Springer
136views Education» more  CORR 2006»
13 years 9 months ago
A Case for Peering of Content Delivery Networks
: The proliferation of Content Delivery Networks (CDN) reveals that existing content networks are owned and operated by individual companies. As a consequence, closed delivery netw...
Rajkumar Buyya, Al-Mukaddim Khan Pathan, James Bro...
JMM2
2008
107views more  JMM2 2008»
13 years 9 months ago
Dynamic Generation of SMIL-Based Multimedia Interfaces
The current heterogeneous world of networks and terminals combined with the generalized mobility of users pose telecommunications operators and service providers the challenge of d...
José Manuel Oliveira, Eurico Carrapatoso