Sciweavers

6978 search results - page 1373 / 1396
» Reframing Requirements Analysis
Sort
View
CCR
2007
107views more  CCR 2007»
13 years 10 months ago
Dynamic load balancing without packet reordering
Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes or link failures. Dynamic load balancing protocols, ho...
Srikanth Kandula, Dina Katabi, Shantanu Sinha, Art...
IJSN
2008
145views more  IJSN 2008»
13 years 10 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
CN
2007
117views more  CN 2007»
13 years 10 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
COMCOM
2007
100views more  COMCOM 2007»
13 years 10 months ago
Sensor replacement using mobile robots
Sensor replacement is important for sensor networks to provide continuous sensing services. Upon sensor node failures, holes (uncovered areas) may appear in the sensing coverage. ...
Yongguo Mei, Changjiu Xian, Saumitra M. Das, Y. Ch...
IJNSEC
2006
96views more  IJNSEC 2006»
13 years 10 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
« Prev « First page 1373 / 1396 Last » Next »