Sciweavers

675 search results - page 122 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
TSP
2008
77views more  TSP 2008»
14 years 9 months ago
Soft-Decision Metrics for Coded Orthogonal Signaling in Symmetric Alpha-Stable Noise
This paper derives new soft-decision metrics for coded orthogonal signaling in impulsive noise, more specifically symmetric -stable noise. For the case of a known channel amplitude...
Michael R. Souryal, Erik G. Larsson, Bojan Peric, ...
NDSS
2006
IEEE
15 years 3 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
ACISP
2006
Springer
15 years 3 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
GLOBECOM
2009
IEEE
15 years 4 months ago
PreDA: Predicate Routing for DTN Architectures over MANET
—We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level...
Flavio Esposito, Ibrahim Matta
MOBIHOC
2007
ACM
15 years 9 months ago
Approximation algorithms for longest-lived directional multicast communications in WANETs
Several centralized and distributed algorithms have been recently proposed to maximize the multicast lifetime for directional communications in wireless ad-hoc networks. Their per...
Song Guo, Oliver W. W. Yang, Victor C. M. Leung