Sciweavers

334 search results - page 12 / 67
» Survey of trust models in different network domains
Sort
View
DAC
2003
ACM
14 years 8 months ago
A survey of techniques for energy efficient on-chip communication
Interconnects have been shown to be a dominant source of energy consumption in modern day System-on-Chip (SoC) designs. With a large (and growing) number of electronic systems bei...
Vijay Raghunathan, Mani B. Srivastava, Rajesh K. G...
IJON
2007
93views more  IJON 2007»
13 years 7 months ago
How much can we trust neural simulation strategies?
Despite a steady improvement of computational hardware, results of numerical simulation are still tightly bound to the simulation tool and strategy used, and may substantially var...
Michelle Rudolph, Alain Destexhe
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
FM
2006
Springer
124views Formal Methods» more  FM 2006»
13 years 11 months ago
Compositional Binding in Network Domains
This paper considers network services that bind identifiers in the course of delivering messages, and also persistent, point-to-point connections made in the context of such bindin...
Pamela Zave
DASC
2006
IEEE
14 years 1 months ago
DRBTS: Distributed Reputation-based Beacon Trust System
Abstract— Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors i...
Avinash Srinivasan, Joshua Teitelbaum, Jie Wu