Sciweavers

1597 search results - page 127 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
HUC
2009
Springer
14 years 1 months ago
A Survey on Localization for Mobile Wireless Sensor Networks
Over the past decade we have witnessed the evolution of wireless sensor networks, with advancements in hardware design, communication protocols, resource efficiency, and other aspe...
Isaac Amundson, Xenofon D. Koutsoukos
ICWS
2003
IEEE
13 years 10 months ago
Access Control in Dynamic XML-Based Web-Services with X-RBAC
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
PERCOM
2008
ACM
14 years 9 months ago
Are our homes ready for services? A domotic infrastructure based on the Web service stack
The increase in computational power and the networking abilities of home appliances are revolutionizing the way we interact with our homes. This trend is growing stronger and open...
Marco Aiello, Schahram Dustdar
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
13 years 9 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
INFOCOM
2010
IEEE
13 years 7 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...