Sciweavers

1597 search results - page 238 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
14 years 2 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
OTM
2004
Springer
14 years 2 months ago
Towards a Peer-to-Peer Event Broker Grid in a Hybrid Network Environment
Peer-to-peer networks and grids offer promising paradigms for developing efficient distributed systems and applications. Event-based middleware is becoming a core architectural el...
Eiko Yoneki, Jean Bacon
MODELS
2009
Springer
14 years 3 months ago
RobbyDBMS: a case study on hardware/software product line engineering
The development of a highly configurable data management system is a challenging task, especially if it is to be implemented on an embedded system that provides limited resources...
Jörg Liebig, Sven Apel, Christian Lengauer, T...
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
14 years 9 months ago
Energy-efficient monitoring of extreme values in sensor networks
Monitoring extreme values (MAX or MIN) is a fundamental problem in wireless sensor networks (and in general, complex dynamic systems). This problem presents very different algorit...
Adam Silberstein, Jun Yang 0001, Kamesh Munagala
CIDM
2009
IEEE
14 years 3 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder