Sciweavers

231 search results - page 23 / 47
» Active Preservation
Sort
View
78
Voted
JCDL
2009
ACM
134views Education» more  JCDL 2009»
15 years 4 months ago
What happens when facebook is gone?
Web users are spending more of their time and creative energies within online social networking systems. While many of these networks allow users to export their personal data or ...
Frank McCown, Michael L. Nelson
DCOSS
2007
Springer
15 years 3 months ago
A Connectivity Based Partition Approach for Node Scheduling in Sensor Networks
This paper presents a Connectivity based Partition Approach (CPA) to reduce the energy consumption of a sensor network by sleep scheduling among sensor nodes. CPA partitions sensor...
Yong Ding, Chen Wang, Li Xiao
INFOCOM
2000
IEEE
15 years 2 months ago
Transport and Application Protocol Scrubbing
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
81
Voted
ICISC
2007
102views Cryptology» more  ICISC 2007»
14 years 11 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
AIPS
2004
14 years 11 months ago
Iterative Relaxations for Iterative Flattening in Cumulative Scheduling
Cumulative scheduling is a generalization of jobshop scheduling, where machines have discrete capacities and activities may require several capacity units. This paper considers it...
Laurent Michel, Pascal Van Hentenryck