Sciweavers

1129 search results - page 48 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
MOBIHOC
2005
ACM
16 years 4 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
ICCS
2003
Springer
15 years 9 months ago
visPerf: Monitoring Tool for Grid Computing
This paper describes a monitoring tool for grid computing[5], called visPerf. It is difficult to see the status of a working production grid system without a customized monitorin...
DongWoo Lee, Jack Dongarra, Rudrapatna S. Ramakris...
DBSEC
2004
97views Database» more  DBSEC 2004»
15 years 5 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
BWCCA
2010
14 years 11 months ago
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larg...
Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Ch...
WISEC
2009
ACM
15 years 11 months ago
Towards a theory for securing time synchronization in wireless sensor networks
Time synchronization in highly distributed wireless systems like sensor and ad hoc networks is extremely important in order to maintain a consistent notion of time throughout the ...
Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, ...