Sciweavers

2517 search results - page 248 / 504
» Secure Deployment of Components
Sort
View
136
Voted
JIPS
2010
389views more  JIPS 2010»
14 years 9 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
121
Voted
GECCO
2007
Springer
185views Optimization» more  GECCO 2007»
15 years 8 months ago
An informed convergence accelerator for evolutionary multiobjective optimiser
A novel optimisation accelerator deploying neural network predictions and objective space direct manipulation strategies is presented. The concept of directing the search through ...
Salem F. Adra, Ian Griffin, Peter J. Fleming
NPC
2007
Springer
15 years 8 months ago
Performance Prediction for Mappings of Distributed Applications on PC Clusters
Abstract. Distributed applications running on clusters may be composed of several components with very different performance requirements. The FlowVR middleware allows the develop...
Sylvain Jubertie, Emmanuel Melin
111
Voted
ACSC
2005
IEEE
15 years 8 months ago
Flexible Exclusion Control for Composite Objects
We present a simple approach for implementing flexible locking strategies in a system of components, which may themselves be composite objects. The approach is flexible in that a ...
Abdelsalam Shanneb, John Potter
114
Voted
SOCO
2005
Springer
15 years 8 months ago
A Lambda Calculus with Forms
Abstract. The need to use position-dependent parameters often hamdefinition of flexible, extensible, and reusable abstractions for software composition. This observation has led ...
Markus Lumpe