Sciweavers

675 search results - page 121 / 135
» A Norm-Governed Systems Perspective of Ad Hoc Networks
Sort
View
NDSS
2006
IEEE
15 years 7 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
145
Voted
MOBICOM
2005
ACM
15 years 7 months ago
VITP: an information transfer protocol for vehicular computing
Recent advances in wireless inter-vehicle communication systems enable the development of Vehicular Ad-Hoc Networks (VANET) and create significant opportunities for the deploymen...
Marios D. Dikaiakos, Saif Iqbal, Tamer Nadeem, Liv...
104
Voted
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
15 years 8 months ago
ACLE: A Communication Environment for Asynchronous Collaborative Learning
The popularity of distributed learning and the continued growth in the number of colleges and universities offering courses delivered entirely via asynchronous learning networks (...
Timothy J. Ellis, William Hafner
JNW
2007
118views more  JNW 2007»
15 years 1 months ago
Collision Prevention Platform for a Dynamic Group of Asynchronous Cooperative Mobile Robots
— This paper presents a fail-safe platform on which cooperative mobile robots rely for their motion. The platform consists of a collision prevention protocol for a dynamic group ...
Rami Yared, Xavier Défago, Julien Iguchi-Ca...
ALGOSENSORS
2010
Springer
15 years 25 days ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...