Sciweavers

3130 search results - page 616 / 626
» Collusion without communication
Sort
View
WIOPT
2010
IEEE
14 years 10 months ago
Minimizing transmission energy in sensor networks via trajectory control
—Energy optimization is a significant component of Wireless Sensor Network (WSN) design. In this paper we consider transmission energy optimization in WSNs where messages are co...
Delia Ciullo, Guner D. Celik, Eytan Modiano
ACSAC
2010
IEEE
14 years 9 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ACSAC
2010
IEEE
14 years 9 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
14 years 9 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport
IMC
2010
ACM
14 years 9 months ago
The impact of YouTube recommendation system on video views
Hosting a collection of millions of videos, YouTube offers several features to help users discover the videos of their interest. For example, YouTube provides video search, relate...
Renjie Zhou, Samamon Khemmarat, Lixin Gao