Sciweavers

622 search results - page 124 / 125
» Fast Computation of Large Distributions and Its Cryptographi...
Sort
View
CCS
2010
ACM
13 years 7 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
BMCBI
2008
115views more  BMCBI 2008»
13 years 6 months ago
Systems biology driven software design for the research enterprise
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...
HEURISTICS
2008
124views more  HEURISTICS 2008»
13 years 6 months ago
A variable neighborhood search for the capacitated arc routing problem with intermediate facilities
In this talk we present a unified Variable Neighborhood Search (VNS) algorithm for the Capacitated Arc Routing Problem (CARP) and some of its variants - the Capacitated Arc Routin...
Michael Polacek, Karl F. Doerner, Richard F. Hartl...
ACSAC
2010
IEEE
13 years 4 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
IMC
2010
ACM
13 years 4 months ago
Comparing DNS resolvers in the wild
The Domain Name System (DNS) is a fundamental building block of the Internet. Today, the performance of more and more applications depend not only on the responsiveness of DNS, bu...
Bernhard Ager, Wolfgang Mühlbauer, Georgios S...