Sciweavers

1010 search results - page 16 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
IWANN
2001
Springer
15 years 4 months ago
A New Approach to Evolutionary Computation: Segregative Genetic Algorithms (SEGA)
This paper looks upon the standard genetic algorithm as an artificial self-organizing process. With the purpose to provide concepts that make the algorithm more open for scalabili...
Michael Affenzeller
BSN
2006
IEEE
194views Sensor Networks» more  BSN 2006»
15 years 5 months ago
Activity Recognition and Monitoring Using Multiple Sensors on Different Body Positions
The design of an activity recognition and monitoring system based on the eWatch, multi-sensor platform worn on different body positions, is presented in this paper. The system ide...
Uwe Maurer, Asim Smailagic, Daniel P. Siewiorek, M...
PERCOM
2005
ACM
15 years 11 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
DAC
1999
ACM
16 years 21 days ago
Effective Iterative Techniques for Fingerprinting Design IP
While previous watermarking-based approaches to intellectual property protection (IPP) have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ens...
Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng...