Sciweavers

1256 search results - page 141 / 252
» A Simple E-Voting Protocol
Sort
View
150
Voted
CIA
2004
Springer
15 years 10 months ago
Towards Monitoring of Group Interactions and Social Roles via Overhearing
We are investigating how to provide intelligent, pervasive support of group of people within so-called “smart environments”. Our current main assumption, based on literature in...
Silvia Rossi, Paolo Busetta
RTSS
2003
IEEE
15 years 9 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
DSOM
2003
Springer
15 years 9 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
SIGMETRICS
2010
ACM
150views Hardware» more  SIGMETRICS 2010»
15 years 9 months ago
Incentive compatibility and dynamics of congestion control
This paper studies under what conditions congestion control schemes can be both efficient, so that capacity is not wasted, and incentive compatible, so that each participant can m...
Brighten Godfrey, Michael Schapira, Aviv Zohar, Sc...
PCI
2009
Springer
15 years 9 months ago
Query Sensitive Storage for Wireless Sensor Networks
—Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS),...
Alexis Papadimitriou, Dimitrios Katsaros, Yannis M...