Sciweavers

3628 search results - page 626 / 726
» Approaching the Physical Limits of Computing
Sort
View
EUROPKI
2004
Springer
15 years 3 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
GECCO
2004
Springer
169views Optimization» more  GECCO 2004»
15 years 3 months ago
Genetic Programming Neural Networks as a Bioinformatics Tool for Human Genetics
The identification of genes that influence the risk of common, complex diseases primarily through interactions with other genes and environmental factors remains a statistical and ...
Marylyn D. Ritchie, Christopher S. Coffey, Jason H...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 3 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
IMC
2003
ACM
15 years 3 months ago
In search of path diversity in ISP networks
Internet Service Providers (ISPs) can exploit path diversity to balance load and improve robustness. Unfortunately, it is difficult to evaluate the potential impact of these appr...
Renata Teixeira, Keith Marzullo, Stefan Savage, Ge...
SIGCOMM
2003
ACM
15 years 3 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson