Sciweavers

1116 search results - page 74 / 224
» Secure Mediation: Requirements and Design
Sort
View
MOBIHOC
2005
ACM
14 years 8 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
EUROSYS
2007
ACM
14 years 6 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
ATAL
2004
Springer
14 years 2 months ago
Naming Services in Multi-Agent Systems: A Design for Agent-Based White Pages
Distributed multi-agent systems require naming services to locate and communicate with remote agents. In this paper we focus on the design and implementation of the “White Pages...
Todd Wright
OOPSLA
2007
Springer
14 years 3 months ago
Supporting systems QoS design and evolution through model transformations
We describe Quality of service pICKER (QUICKER), a model-driven QoS mapping toolchain for supporting the QoS design and evolution of systems software. QUICKER automates the mappin...
Amogh Kavimandan, Aniruddha S. Gokhale
IV
2009
IEEE
124views Visualization» more  IV 2009»
14 years 3 months ago
Needs Assessment for the Design of Information Synthesis Visual Analytics Tools
Information synthesis is a key portion of the analysis process with visual analytics tools. This stage of work requires users to collect, organize, and add meaning to individual a...
Anthony C. Robinson