Sciweavers

5210 search results - page 936 / 1042
» Computing Capabilities of Mediators
Sort
View
WS
2003
ACM
15 years 6 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
WWW
2003
ACM
15 years 6 months ago
Media Companion: Delivering Content-oriented Web Services to Internet Media
In the past few years we have seen a huge industrial investment on the development of content delivery networks (CDNs) which provide a large number of caches and storage devices a...
Wei-Ying Ma, Xing Xie, Chun Yuan, Yu Chen, Zheng Z...
130
Voted
CCS
2003
ACM
15 years 6 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
ECAL
2003
Springer
15 years 6 months ago
A Universal Framework for Self-Replication
Abstract. Self-replication is a fundamental property of many interesting physical, formal and biological systems, such as crystals, waves, automata, and especially forms of natural...
Bryant Adams, Hod Lipson
GI
2003
Springer
15 years 6 months ago
An Integrated Approach to Survivability Analysis of Large Complex Critical Infrastructures
: The integrated approach for analysis of Large Complex Critical Infrastructures (LCCIs) to afford survivability aimed at preparing a Roadmap for Research and Development for criti...
Sandro Bologna, Thomas Beer