Sciweavers

246 search results - page 42 / 50
» Simulation of Buffer Management Policies in Networks for Gri...
Sort
View
SASN
2005
ACM
14 years 1 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
AIMS
2008
Springer
14 years 1 months ago
Dynamic Consistency Analysis for Convergent Operators
It has been shown that sets of convergent operators with a shared fixed point can simulate autonomic control mechanisms, but many questions remain about this management technique....
Alva L. Couch, Marc Chiarini
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ICCCN
2007
IEEE
13 years 11 months ago
Exploring Load-Balance to Dispatch Mobile Sensors in Wireless Sensor Networks
In this paper, a hybrid sensor network consisting of static and mobile sensors is considered, where static sensors are used to detect events, and mobile sensors can move to event l...
You-Chiun Wang, Wen-Chih Peng, Min-Hsien Chang, Yu...
CCGRID
2004
IEEE
13 years 11 months ago
Remote partial file access using compact pattern descriptions
We present a method for the efficient access to parts of remote files. The efficiency is achieved by using a file format independent compact pattern description, that allows to re...
Thorsten Schütt, André Merzky, Andrei ...