Sciweavers

5123 search results - page 93 / 1025
» Performance and Security Tradeoff
Sort
View
POLICY
2009
Springer
15 years 11 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
RTSS
2009
IEEE
15 years 11 months ago
On the Implementation of Global Real-Time Schedulers
An empirical study of implementation tradeoffs (choice of ready queue implementation, quantum-driven vs. eventdriven scheduling, and interrupt handling strategy) affecting global ...
Björn B. Brandenburg, James H. Anderson
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
15 years 2 months ago
Towards optimally efficient field estimation with threshold-based pruning in real robotic sensor networks
Abstract-- The efficiency of distributed sensor networks depends on an optimal trade-off between the usage of resources and data quality. The work in this paper addresses the probl...
Amanda Prorok, Christopher M. Cianci, Alcherio Mar...
NDSS
2005
IEEE
15 years 10 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ICICS
2010
Springer
15 years 2 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...