Sciweavers

2503 search results - page 269 / 501
» Building Computer Network Attacks
Sort
View
ISWC
2003
IEEE
15 years 7 months ago
Sensing and Modeling Human Networks using the Sociometer
Knowledge of how people interact is important in many disciplines, e.g. organizational behavior, social network analysis, information diffusion and knowledge management applicatio...
Tanzeem Choudhury, Alex Pentland
CHI
2006
ACM
16 years 2 months ago
A fisheye follow-up: further reflections on focus + context
Information worlds continue to grow, posing daunting challenges for interfaces. This paper tries to increase our understanding of approaches to the problem, building on the Genera...
George W. Furnas
ISSADS
2005
Springer
15 years 7 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
ICNP
2006
IEEE
15 years 8 months ago
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Qiming Li, Dah-Ming Chiu, John C. S. Lui

Publication
402views
17 years 11 days ago
Geometric Broadcast Protocol for Heterogeneous Wireless Networks
We present Geometric Broadcast for Heterogeneous Sensor Networks (GBS), a novel broad- casting protocol for heterogeneous wireless sensor and actor networks. While broadcasting is ...
V. Paruchuri, A. Durresi, Raj Jain