Sciweavers

2116 search results - page 315 / 424
» Resource Analysis by Sup-interpretation
Sort
View
133
Voted
UCS
2007
Springer
15 years 9 months ago
Using Auction Based Group Formation for Collaborative Networking in Ubicomp
In many Ubicomp scenarios tiny wireless embedded sensor devices are used, and devices often collaborate to accomplish a common goal. This paper presents a group formation method de...
Christian Decker, Emilian Peev, Till Riedel, Marti...
119
Voted
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 9 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
WWIC
2007
Springer
156views Communications» more  WWIC 2007»
15 years 9 months ago
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to p...
Tran Thanh Dai, Choong Seon Hong
112
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
AICCSA
2006
IEEE
179views Hardware» more  AICCSA 2006»
15 years 9 months ago
Supporting the SPEM with a UML Extended Workflow Metamodel
The specification, analysis, and administration of business processes have charged great importance in this last time. This has been caused by a competitive industry necessity, dy...
Narayan C. Debnath, Daniel Riesco, Manuel Pé...