Sciweavers

3424 search results - page 464 / 685
» Building Diverse Computer Systems
Sort
View
INFOCOM
2011
IEEE
14 years 8 months ago
Optimal control of epidemic evolution
—Epidemic models based on nonlinear differential equations have been extensively applied in a variety of systems as diverse as infectious outbreaks, marketing, diffusion of belie...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
WWW
2008
ACM
16 years 5 months ago
Semantic similarity based on compact concept ontology
This paper presents a new method of calculating the sematic similarity between articles based on WordNet. To further improve the performance of the proposed method, we build a new...
Ce Zhang, Yu-Jing Wang, Bin Cui, Gao Cong
ESORICS
2009
Springer
16 years 5 months ago
ID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure d...
Nils Ole Tippenhauer, Srdjan Capkun
PERCOM
2009
ACM
16 years 5 months ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura
PERCOM
2006
ACM
16 years 4 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...