Sciweavers

2927 search results - page 153 / 586
» Secure Distributed Human Computation
Sort
View
CSREASAM
2006
13 years 11 months ago
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
Hao Wang, Zhongfu Wu, Xin Tan
DSOM
2004
Springer
14 years 3 months ago
HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management
Autonomic distributed management enables for deploying self-directed monitoring and control tasks that track dynamic network problems such as performance degradation and security t...
Ehab S. Al-Shaer, Bin Zhang
GCC
2004
Springer
14 years 3 months ago
Applying Grid Technologies to Distributed Data Mining
The Grid promises improvements in the effectiveness with which global businesses are managed, if it enables distributed expertise to be efficiently applied to the analysis of dist...
Alastair C. Hume, Ashley D. Lloyd, Terence M. Sloa...
ICNSC
2007
IEEE
14 years 4 months ago
A New Anti-Spam Protocol Using CAPTCHA
— Today sending spams has turned to be a major problem in the Internet. It is so serious that more than 80% of the transferred emails are spams. As a result, various methods have...
Sajad Shirali-Shahreza, Ali Movaghar
SENSYS
2004
ACM
14 years 3 months ago
Distributed attention
As distributed surveillance networks are deployed over larger areas and in increasingly busy environments, limiting the computation, bandwidth, and human attention burdens imposed...
Maurice Chu, Patrick Cheung, James Reich