Sciweavers

4076 search results - page 264 / 816
» A framework for developing distributed location based applic...
Sort
View
ASIACRYPT
2006
Springer
15 years 8 months ago
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Abstract. Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fa...
Souradyuti Paul, Bart Preneel
ICPPW
2007
IEEE
15 years 10 months ago
Cooperative Localization with Pre-Knowledge Using Bayesian Network for Wireless Sensor Networks
Obtaining location information by localization schemes for sensor nodes makes applications of wireless sensor networks (WSNs) more meaningful. Most of localization schemes only us...
Shih-Hsiang Lo, Chun-Hsien Wu, Yeh-Ching Chung
CCECE
2006
IEEE
15 years 10 months ago
Detecting Distributed Denial of Service Attack Traffic at the Agent Machines
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We be...
Vicky Laurens, Abdulmotaleb El-Saddik, Pulak Dhar,...
147
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
GLIDER: gradient landmark-based distributed routing for sensor networks
— We present Gradient Landmark-Based Distributed Routing (GLIDER), a novel naming/addressing scheme and associated routing algorithm, for a network of wireless communicating node...
Qing Fang, Jie Gao, Leonidas J. Guibas, V. de Silv...
GECCO
1999
Springer
133views Optimization» more  GECCO 1999»
15 years 8 months ago
Non-Standard Crossover for a Standard Representation - Commonality-Based Feature Subset Selection
The Commonality-Based Crossover Framework has been presented as a general model for designing problem specific operators. Following this model, the Common Features/Random Sample ...
Stephen Y. Chen, Cesar Guerra-Salcedo, Stephen F. ...