Sciweavers

6329 search results - page 1173 / 1266
» Detection of Stochastic Processes
Sort
View
GIS
2010
ACM
15 years 2 months ago
A data stream-based evaluation framework for traffic information systems
Traffic information systems based on mobile, in-car sensor technology are a challenge for data management systems as a huge amount of data has to be processed in real-time. Data m...
Sandra Geisler, Christoph Quix, Stefan Schiffer
178
Voted
GLOBECOM
2010
IEEE
15 years 2 months ago
Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks
We propose a spectrum decision protocol resilient to primary user emulation attacks (PUEA) in dynamic spectrum access networks. PUEA is a type of denial-of-service attack that can ...
Z. Jin, S. Anand, K. P. Subbalakshmi
GLOBECOM
2010
IEEE
15 years 2 months ago
Independent Parallel Compact Finite Automatons for Accelerating Multi-String Matching
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...
GLOBECOM
2010
IEEE
15 years 2 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...
ICISS
2010
Springer
15 years 2 months ago
Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems
Existing proposals for end-to-end independently-verifiable (E2E) voting systems require that voters check the presence of a "receipt" on a secure bulletin board. The tall...
Mridul Nandi, Stefan Popoveniuc, Poorvi L. Vora
« Prev « First page 1173 / 1266 Last » Next »