Sciweavers

2503 search results - page 273 / 501
» Building Computer Network Attacks
Sort
View
DSN
2004
IEEE
15 years 5 months ago
Robust Aggregation Protocols for Large-Scale Overlay Networks
Aggregation refers to a set of functions that provide global information about a distributed system. These functions operate on numeric values distributed over the system and can ...
Alberto Montresor, Márk Jelasity, Özal...
DSOM
2005
Springer
15 years 7 months ago
An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation
Presently, there is no satisfactory model for dealing with political autonomy of agents in policy based management. A theory of atomic policy units called ‘promises’ is therefo...
Mark Burgess
ICN
2005
Springer
15 years 7 months ago
Enhancing QoS Through Alternate Path: An End-to-End Framework
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These ...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...
EH
2002
IEEE
161views Hardware» more  EH 2002»
15 years 6 months ago
An Immunochip Architecture and Its Emulation
The paper proposes an architecture for building immunochips and provides a mathematical framework in describing some of its operations using the concepts of proteins and immune ne...
Alexander O. Tarakanov, Dipankar Dasgupta
PERVASIVE
2007
Springer
15 years 8 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen