Sciweavers

21430 search results - page 4104 / 4286
» Abstract Effective Models
Sort
View
151
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
136
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
145
Voted
MOBIHOC
2002
ACM
16 years 3 months ago
Routing performance in the presence of unidirectional links in multihop wireless networks
We examine two aspects concerning the influence of unidirectional links on routing performance in multihop wireless networks. In the first part of the paper, we evaluate the benef...
Mahesh K. Marina, Samir Ranjan Das
145
Voted
WSDM
2010
ACM
227views Data Mining» more  WSDM 2010»
16 years 1 months ago
Folks in folksonomies: Social link prediction from shared metadata
Web 2.0 applications have attracted a considerable amount of attention because their open-ended nature allows users to create lightweight semantic scaffolding to organize and shar...
Rossano Schifanella, Alain Barrat, Ciro Cattuto, B...
126
Voted
ICS
2010
Tsinghua U.
16 years 1 months ago
Non-Malleable Codes
We introduce the notion of "non-malleable codes" which relaxes the notion of error-correction and errordetection. Informally, a code is non-malleable if the message cont...
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wic...
« Prev « First page 4104 / 4286 Last » Next »