Sciweavers

3415 search results - page 645 / 683
» Physical Design Refinement: The
Sort
View
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 5 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
ATAL
2009
Springer
14 years 5 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
BTW
2009
Springer
153views Database» more  BTW 2009»
14 years 5 months ago
Formalizing ETL Jobs for Incremental Loading of Data Warehouses
Abstract: Extract-transform-load (ETL) tools are primarily designed for data warehouse loading, i.e. to perform physical data integration. When the operational data sources happen ...
Thomas Jörg, Stefan Deßloch
ICCS
2009
Springer
14 years 5 months ago
A Scalable and Adaptable Solution Framework within Components of the Community Climate System Model
Abstract. A framework for a fully implicit solution method is implemented into (1) the High Order Methods Modeling Environment (HOMME), which is a spectral element dynamical core o...
Katherine J. Evans, Damian W. I. Rouson, Andrew G....
IMC
2009
ACM
14 years 5 months ago
Characterizing VLAN-induced sharing in a campus network
Many enterprise, campus, and data-center networks have complex layer-2 virtual LANs (“VLANs”) below the IP layer. The interaction between layer-2 and IP topologies in these VL...
Muhammad Mukarram Bin Tariq, Ahmed Mansy, Nick Fea...