Sciweavers

1369 search results - page 191 / 274
» A Practical Implementation of the Timing Attack
Sort
View
DGO
2003
139views Education» more  DGO 2003»
15 years 14 days ago
Better Public Policy Through Natural Language Information Access
Federal agencies implement laws passed by the Congress by creating rules and regulations that can be applied in practice. During this process, staffs at the various agencies may r...
Boris Katz, Roger Hurwitz, Jimmy J. Lin, Özle...
85
Voted
WSC
2004
15 years 14 days ago
HDPS, an XML/XSLT Based Hierarchal Modeling System
HDPS is a practical system for designing modeling paradigms, creating hierarchal model definitions, and evaluating multi-paradigm models - particularly in business and finance. HD...
Richard Evan Curry, Kiriakos Vlahos
ENTCS
2007
145views more  ENTCS 2007»
14 years 11 months ago
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communication and sensing devices, with restricted energy and computing capabilities, ...
Ioannis Chatzigiannakis, Elisavet Konstantinou, Va...
IEEECIT
2010
IEEE
14 years 9 months ago
Fuzzy Location Service for Mobile Ad Hoc Networks
Abstract—Over the past years, location-based routing protocols have been studied extensively in mobile ad hoc networks (MANETs). However, how to efficiently provide the location ...
Yongming Xie, Guojun Wang, Jie Wu
94
Voted
INFOCOM
2010
IEEE
14 years 9 months ago
SlideOR: Online Opportunistic Network Coding in Wireless Mesh Networks
—Opportunistic routing significantly increases unicast throughput in wireless mesh networks by effectively utilizing the wireless broadcast medium. With network coding, opportun...
Yunfeng Lin, Ben Liang, Baochun Li