Sciweavers

4264 search results - page 21 / 853
» Provenance-aware secure networks
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
14 years 11 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
110
Voted
TELSYS
2010
104views more  TELSYS 2010»
14 years 11 months ago
The future of security in Wireless Multimedia Sensor Networks - A position paper
Manel Guerrero Zapata, Ruken Zilan, José M....