Sciweavers

4222 search results - page 148 / 845
» Challenges in Service-Oriented Networking
Sort
View
IPPS
2003
IEEE
15 years 4 months ago
Ad Hoc Networks: A Protocol for Supporting QoS Applications
A delay-bounded service in wireless ad hoc networks is challenging, as ad hoc networks do not provide any type of guarantees. Several protocols have been proposed to support appli...
Lorenzo Donatiello, Marco Furini
IWSOS
2009
Springer
15 years 4 months ago
Self-management of Routing on Human Proximity Networks
Abstract. Many modern network applications, including sensor networks and MANETs, have dynamic topologies that reflect processes occurring in the outside world. These dynamic proc...
Graham Williamson, Davide Cellai, Simon A. Dobson,...
MOBICOM
2000
ACM
15 years 3 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
ACSAC
1998
IEEE
15 years 3 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 3 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...