Sciweavers

14403 search results - page 2780 / 2881
» Dynamical Systems Trees
Sort
View
ALGOSENSORS
2010
Springer
14 years 9 months ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
CDC
2010
IEEE
139views Control Systems» more  CDC 2010»
14 years 5 months ago
Communication, convergence, and stochastic stability in self-assembly
Existing work on programmable self assembly has focused on deterministic performance guarantees--stability of desirable states. In particular, for any acyclic target graph a binary...
Michael J. Fox, Jeff S. Shamma
COMCOM
2011
14 years 5 months ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
CSCW
2011
ACM
14 years 5 months ago
"Not my bug!" and other reasons for software bug report reassignments
Bug reporting/fixing is an important social part of the software development process. The bug-fixing process inherently has strong inter-personal dynamics at play, especially in h...
Philip J. Guo, Thomas Zimmermann, Nachiappan Nagap...
WWW
2011
ACM
14 years 4 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
« Prev « First page 2780 / 2881 Last » Next »