Sciweavers

1597 search results - page 167 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
CODES
2006
IEEE
14 years 3 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
DSN
2005
IEEE
14 years 2 months ago
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
EDBT
2009
ACM
218views Database» more  EDBT 2009»
14 years 4 months ago
Data integration flows for business intelligence
Business Intelligence (BI) refers to technologies, tools, and practices for collecting, integrating, analyzing, and presenting large volumes of information to enable better decisi...
Umeshwar Dayal, Malú Castellanos, Alkis Sim...
ISCAS
2006
IEEE
160views Hardware» more  ISCAS 2006»
14 years 3 months ago
Address-event image sensor network
We describe a sensor network based on smart requirements of the network. This will provide a new approach imager sensors able to extract events of interest from a scene. for compos...
Eugenio Culurciello, Andreas Savvides
VRML
2005
ACM
14 years 2 months ago
Visualization across the pond: how a wireless PDA can collaborate with million-polygon datasets via 9, 000km of cable
We present an initial report on using our distributed, collaborative grid enabled visualization environment to link SuperComputing 2004 (Pittsburgh, PA, USA) with the Cardiff Scho...
Ian J. Grimstead, Nick J. Avis, David W. Walker