Sciweavers

1323 search results - page 74 / 265
» Updatable Security Views
Sort
View
AWCC
2004
Springer
14 years 3 months ago
Securing Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...
TC
2008
13 years 10 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
ICDE
1997
IEEE
133views Database» more  ICDE 1997»
14 years 11 months ago
Physical Database Design for Data Warehouses
Data warehouses collect copies of information from remote sources into a single database. Since the remote data is cached at the warehouse, it appears as local relations to the us...
Wilburt Labio, Dallan Quass, Brad Adelberg
AVI
2004
13 years 11 months ago
Exploratory visualization using bracketing
There are many tools that provide the user with an abundance of sliders, buttons and options to change; such tools are popular in exploratory visualization. As the user changes th...
Jonathan C. Roberts
NSPW
2006
ACM
14 years 4 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...