-
1
-
-
84883302763
-
-
Colorado State Computer Networking Research Laboratory's Virtual Sensor Networks (VSNs)
-
Colorado State Computer Networking Research Laboratory's Virtual Sensor Networks (VSNs), http://www. cnrl. colostate. edu/Projects/VSNs/vsns. html.
-
-
-
-
2
-
-
62949119292
-
Cluster tree based self Organization of virtual sensor networks
-
New Orleans, LA, Nov.
-
H. M. N. D. Bandara, A. P. Jayasumana, and T. H. Illangasekare, "Cluster tree based self Organization of virtual sensor networks," IEEE Globecom Workshop on Wireless Mesh and Sensor Networks, New Orleans, LA, Nov. 2008.
-
(2008)
IEEE Globecom Workshop on Wireless Mesh and Sensor Networks
-
-
Bandara, H.M.N.D.1
Jayasumana, A.P.2
Illangasekare, T.H.3
-
3
-
-
34548118411
-
Virtual sensor networks- A resource efficient approach for concurrent applications
-
Las Vegas, NV, April
-
A. P. Jayasumana, Q. Han, and T. Illangasekare, "Virtual sensor networks- A resource efficient approach for concurrent applications," in Proc. 4th International Conference on Information Technology: New Generations (ITNG 2007), Las Vegas, NV, April 2007.
-
(2007)
Proc. 4th International Conference on Information Technology: New Generations (ITNG 2007
-
-
Jayasumana, A.P.1
Han, Q.2
Illangasekare, T.3
-
4
-
-
79959306393
-
A serviceoriented application programming interface for sensor network virtualization
-
Apr
-
M. Iqbal, D. Yang, T. Obaid, T. J. Ng, and H. B. Lim, "A serviceoriented application programming interface for sensor network virtualization," Proc. of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Apr 2011.
-
(2011)
Proc. of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011
-
-
Iqbal, M.1
Yang, D.2
Obaid, T.3
Ng, T.J.4
Lim, H.B.5
-
6
-
-
84883279962
-
Challenges in secure sensor-cloud computing
-
N. Poolsappasit, V. Kumar, S. Madria, and S. Chellappan, "Challenges in secure sensor-cloud computing," in Proc. of Secure Data Management, 2011.
-
(2011)
Proc. of Secure Data Management
-
-
Poolsappasit, N.1
Kumar, V.2
Madria, S.3
Chellappan, S.4
-
8
-
-
84883264750
-
A logic approach to virtual sensor networks
-
L. Caroprese, C. Comito, D. Talia, and E. Zumpano, "A logic approach to virtual sensor networks," in Proc. of IDEAS'10, 2010.
-
(2010)
Proc. of IDEAS'10
-
-
Caroprese, L.1
Comito, C.2
Talia, D.3
Zumpano, E.4
-
11
-
-
34548812842
-
Trust, trustworthiness, and trust propensity: A meta-analytic test of their unique relationships with risk taking and job performance
-
J. A. Colquitt, A. Brent, and J. A. LePine, "Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance," Journal of Applied Psychology, vol. 92(6), pp. 909-927, 2007.
-
(2007)
Journal of Applied Psychology
, vol.92
, Issue.6
, pp. 909-927
-
-
Colquitt, J.A.1
Brent, A.2
Lepine, J.A.3
-
13
-
-
21344475322
-
The commitment-trust theory of relationship marketing
-
R. Morgan, and S. Hunt, "The commitment-trust theory of relationship marketing," The Journal of Marketing, vol. 58(3), pp. 20-38, 1994.
-
(1994)
The Journal of Marketing
, vol.58
, Issue.3
, pp. 20-38
-
-
Morgan, R.1
Hunt, S.2
-
14
-
-
0001951820
-
Can we trust trust?
-
electronic edition, Department of Sociology, University of Oxford, D. Gambetta (ed. ), chapter 13
-
D. Gambetta, "Can We Trust Trust?" in Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, D. Gambetta (ed. ), chapter 13, pp. 213-237, 2000.
-
(2000)
Trust: Making and Breaking Cooperative Relations
, pp. 213-237
-
-
Gambetta, D.1
-
15
-
-
0033903726
-
Supporting trust in virtual communities
-
A. Abdul-Rahman, and S. Hailes, "Supporting trust in virtual communities," in Proc. of the 33rd Ann. Hawaii Int'l Conf. Syst. Sci. (HICSS 33), vol. 6, pp. 6007-6016, 2000.
-
(2000)
Proc. of the 33rd Ann. Hawaii Int'l Conf. Syst. Sci. (HICSS 33)
, vol.6
, pp. 6007-6016
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
17
-
-
84883297576
-
A survey of trust and reputation management systems in wireless communications
-
H. Yu et al., "A survey of trust and reputation management systems in wireless communications," in Proc. of the IEEE, 2004.
-
(2004)
Proc. of the IEEE
-
-
Yu, H.1
-
18
-
-
80052474886
-
On trust evaluation in mobile ad hoc networks
-
D. Q. Nguyen, L. Lamont, and P. C. Mason, "On trust evaluation in mobile ad hoc networks," Security and privacy in mobile information and communication systems, vol. 17, pp. 1-13, 2009.
-
(2009)
Security and Privacy in Mobile Information and Communication Systems
, vol.17
, pp. 1-13
-
-
Nguyen, D.Q.1
Lamont, L.2
Mason, P.C.3
-
22
-
-
33744915525
-
Trust establishment in pure ad-hoc networks
-
A. A. Pirzada, and C. McDonald, "Trust establishment in pure ad-hoc networks," Wireless Personal Communications, vol. 37(1-2), pp. 139-168, 2006.
-
(2006)
Wireless Personal Communications
, vol.37
, Issue.1-2
, pp. 139-168
-
-
Pirzada, A.A.1
McDonald, C.2
-
23
-
-
33745940320
-
A quantitative trust establishment framework for reliable data packet delivery in MANETs
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A quantitative trust establishment framework for reliable data packet delivery in MANETs," in Proc. of SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 1-10, 2005.
-
(2005)
Proc. of SASN '05: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 1-10
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
24
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Y. L. Sun, Z. Han, W. Yu, and K. J. Ray Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks," in IEEE International Conference on Computer Communications, INFOCOM'06, pp. 1-13, 2006.
-
(2006)
IEEE International Conference on Computer Communications, INFOCOM'06
, pp. 1-13
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Ray Liu, K.J.4
-
25
-
-
84883309336
-
-
Apache Hadoop
-
Apache Hadoop, http://hadoop. apache. org/.
-
-
-
-
26
-
-
84883298979
-
-
NIST National Vulnerability Database Version 2. 2
-
NIST National Vulnerability Database Version 2. 2, http://nvd. nist. gov/.
-
-
-
-
27
-
-
84883271873
-
Trust-aware in-network aggregation in wireless sensor networks
-
J. Deng et al., "Trust-aware in-network aggregation in wireless sensor networks," in Proc. of the IEEE GlobeCom, 2009.
-
(2009)
Proc. of the IEEE GlobeCom
-
-
Deng, J.1
|