Sciweavers

2116 search results - page 315 / 424
» Resource Analysis by Sup-interpretation
Sort
View
UCS
2007
Springer
14 years 3 months ago
Using Auction Based Group Formation for Collaborative Networking in Ubicomp
In many Ubicomp scenarios tiny wireless embedded sensor devices are used, and devices often collaborate to accomplish a common goal. This paper presents a group formation method de...
Christian Decker, Emilian Peev, Till Riedel, Marti...
VLDB
2007
ACM
160views Database» more  VLDB 2007»
14 years 3 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
WWIC
2007
Springer
156views Communications» more  WWIC 2007»
14 years 3 months ago
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to p...
Tran Thanh Dai, Choong Seon Hong
ACSAC
2006
IEEE
14 years 3 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
AICCSA
2006
IEEE
179views Hardware» more  AICCSA 2006»
14 years 3 months ago
Supporting the SPEM with a UML Extended Workflow Metamodel
The specification, analysis, and administration of business processes have charged great importance in this last time. This has been caused by a competitive industry necessity, dy...
Narayan C. Debnath, Daniel Riesco, Manuel Pé...