Sciweavers

499 search results - page 98 / 100
» A Study on Latent Vulnerabilities
Sort
View
SIGCOMM
2010
ACM
13 years 6 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
CMS
2010
149views Communications» more  CMS 2010»
13 years 6 months ago
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Abstract. Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible...
Ge Zhang, Simone Fischer-Hübner
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 5 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
BMCBI
2006
113views more  BMCBI 2006»
13 years 5 months ago
GibbsST: a Gibbs sampling method for motif discovery with enhanced resistance to local optima
Background: Computational discovery of transcription factor binding sites (TFBS) is a challenging but important problem of bioinformatics. In this study, improvement of a Gibbs sa...
Kazuhito Shida
COMCOM
2006
81views more  COMCOM 2006»
13 years 5 months ago
Multiple link failures survivability of optical networks with traffic grooming capability
This paper investigates the problem of survivable traffic grooming (STG) in shared mesh optical networks and proposes different frameworks for improving the survivability of low s...
Chadi Assi, Wei Huo, Abdallah Shami