Sciweavers

1597 search results - page 98 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
IH
2005
Springer
14 years 4 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
AGENTS
2001
Springer
14 years 2 months ago
Configuration management for multi-agent systems
As heterogeneous distributed systems, multi-agent systems present some challenging con guration management issues. There are the problems of knowing how to allocate agents to comp...
Joseph A. Giampapa, Octavio H. Juarez-Espinosa, Ka...
UBIMOB
2009
ACM
225views Management» more  UBIMOB 2009»
14 years 3 months ago
Historical data storage for large scale sensor networks
Wireless sensor networks are rapidly finding their way through a plethora of new applications like precision farming and forestry, with increasing network scale, system complexit...
Loïc Petit, Abdelhamid Nafaa, Raja Jurdak
ICDCSW
2009
IEEE
14 years 5 months ago
Embedded Virtual Machines for Robust Wireless Control Systems
Embedded wireless networks have largely focused on openloop sensing and monitoring. To address actuation in closedloop wireless control systems there is a strong need to re-think ...
Rahul Mangharam, Miroslav Pajic
INFOCOM
2008
IEEE
14 years 5 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan