Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleMarch 2005
How to incorporate revocation status information into the trust metrics for public-key certification
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 1594–1598https://doi.org/10.1145/1066677.1067037In a traditional PKI, the trust associated with a public key is expressed in binary either by 0 or 1. Alternatively, several authors have proposed trust metrics to evaluate the confidence afforded by a public key. However their work has a static point ...
- ArticleMarch 2005
Enhancing network intrusion detection systems with interval methods
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 1444–1448https://doi.org/10.1145/1066677.1067006Two main approaches for network intrusion detection are misuse detection [6] and anomaly detection [11]. The limitation of the misuse approach is that cannot effectively detect new patterns of intrusions that are not precisely encoded in the system [11]...
- ArticleMarch 2005
Developing component based adaptive applications in mobile environments
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 1146–1150https://doi.org/10.1145/1066677.1066935Today, although the system supports for developing distributed applications become mature, they are inadequate for mobile environments where the runtime resources vary considerably or even disappear spontaneously. The objective of our work is to provide ...
- ArticleMarch 2005
Efficient placement and routing in grid-based networks
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 899–900https://doi.org/10.1145/1066677.1066882This paper presents an efficient technique for placement and routing of sensors/actuators and processing units in a grid network. Our system requires an extremely high level of robustness and efficient power optimization techniques. By modeling the ...
- ArticleMarch 2005
Profiling and mapping of parallel workloads on network processors
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 890–896https://doi.org/10.1145/1066677.1066879Network processors are embedded system-on-a-chip multiprocessors that are optimized to perform simple packet processing tasks at data rates of several Gigabits per second. To meet the performance demands of increasing link speeds and more complex ...
- ArticleMarch 2005
A fast start-up technique for flash memory based computing systems
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 843–849https://doi.org/10.1145/1066677.1066871Flash memory based embedded computing systems are becoming increasingly prevalent. These systems typically have to provide an instant start-up time. However, we observe that mounting a file system for flash memory takes 1 to 25 seconds mainly depending ...
- ArticleMarch 2005
Supporting e-commerce systems formalization with choreography languages
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 831–835https://doi.org/10.1145/1066677.1066867E-commerce as well as B2B applications are essentially based on interactions between different people and organizations (e.g. industry, banks, customers) that usually exploit the Internet as communication media. Web Services provide a mean to deal with ...
- ArticleMarch 2005
Node clustering based on link delay in P2P networks
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 744–749https://doi.org/10.1145/1066677.1066845Peer-to-peer (P2P) has become an important computing model because of its adaptation, self-organization and autonomy etc. But efficient organization of the nodes in P2P networks is still a challenge needs to be addressed. Node clustering is a mechanism ...
- ArticleMarch 2005
SELS: a secure e-mail list service
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 306–313https://doi.org/10.1145/1066677.1066752Exchange of private information content among a large number of users via E-mail List Services is becoming increasingly common. In this paper we address security requirements in that setting and develop a new protocol, SELS (a Secure E-mail List Service)...
- ArticleMarch 2005
Adaptive and fault tolerant medical vest for life-critical medical monitoring
SAC '05: Proceedings of the 2005 ACM symposium on Applied computingMarch 2005, Pages 272–279https://doi.org/10.1145/1066677.1066741In recent years, exciting technological advances have been made in development of flexible electronics. These technologies offer the opportunity to weave computation, communication and storage into the fabric of the every clothing that we wear, ...