Sciweavers

2517 search results - page 318 / 504
» Secure Deployment of Components
Sort
View
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 1 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
ICDE
2009
IEEE
182views Database» more  ICDE 2009»
14 years 11 months ago
Environmental Monitoring 2.0
A sensor network data gathering and visualization infrastructure is demonstrated, comprising of Global Sensor Networks (GSN) middleware and Microsoft SensorMap. Users are invited t...
Sebastian Michel, Ali Salehi, Liqian Luo, Nicholas...
ICDE
2003
IEEE
101views Database» more  ICDE 2003»
14 years 10 months ago
XomatiQ: Living With Genomes, Proteomes, Relations and a Little Bit of XML
In this paper, we describe a system called XomatiQ to address the problem of integration, querying and correlation of biological data. XomatiQ is an integral part of the genomics ...
Sourav S. Bhowmick, Pedro Cruz, Amey V. Laud
VLSID
2007
IEEE
152views VLSI» more  VLSID 2007»
14 years 9 months ago
An Efficient Technique for Leakage Current Estimation in Sub 65nm Scaled CMOS Circuits Based on Loading Effect
With scaling of CMOS technologies, sub-threshold, gate and reverse biased junction band-to-band-tunneling leakage have increased dramatically. Together they account for more than 2...
Ashesh Rastogi, Wei Chen, Alodeep Sanyal, Sandip K...
MOBISYS
2005
ACM
14 years 8 months ago
Design and implementation of a single system image operating system for ad hoc networks
In this paper, we describe the design and implementation of a distributed operating system for ad hoc networks. Our system simplifies the programming of ad hoc networks and extend...
Hongzhou Liu, Tom Roeder, Kevin Walsh, Rimon Barr,...