Sciweavers

1692 search results - page 325 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
CDC
2010
IEEE
215views Control Systems» more  CDC 2010»
14 years 6 months ago
Consensus with robustness to outliers via distributed optimization
Over the past few years, a number of distributed algorithms have been developed for integrating the measurements acquired by a wireless sensor network. Among them, average consensu...
Jixin Li, Ehsan Elhamifar, I.-Jeng Wang, Ren&eacut...
RAID
2010
Springer
14 years 10 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
INFOCOM
2007
IEEE
15 years 6 months ago
Cooperating with Smartness: Using Heterogeneous Smart Antennas in Ad-Hoc Networks
Abstract— The ability of smart antennas to improve performance in a typically constrained ad-hoc network environment, has helped them garner significant attention over the last ...
Karthikeyan Sundaresan, Raghupathy Sivakumar
CCS
2005
ACM
15 years 5 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
MOBISYS
2007
ACM
15 years 11 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...