Sciweavers

1692 search results - page 326 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
PERCOM
2009
ACM
15 years 6 months ago
A Mobile Product Recommendation System Interacting with Tagged Products
— This paper presents a concept that enables consumers to access and share product recommendations using their mobile phone. Based on a review of current product recommendation m...
Felix von Reischach, Florian Michahelles, Dominiqu...
DFN
2003
15 years 1 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
IC
2004
15 years 1 months ago
Controlling Inbound Traffic
This work considers the problem of prioritizing the inbound TCP traffic of an organization network. The objective is to allocate dynamically a specific share of the incoming link ...
Saad Biaz
CTRSA
2003
Springer
96views Cryptology» more  CTRSA 2003»
15 years 4 months ago
Hardware Performance Characterization of Block Cipher Structures
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) ma...
Lu Xiao, Howard M. Heys
EAGC
2003
Springer
15 years 4 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...