Sciweavers

8080 search results - page 389 / 1616
» From Computer Networks to Agent Networks
Sort
View
PERCOM
2010
ACM
15 years 3 months ago
Architecture and protocols for the Internet of Things: A case study
—In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy. Our network spans the floors of different bui...
Angelo Paolo Castellani, Nicola Bui, Paolo Casari,...
CCS
2009
ACM
16 years 5 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
AAAI
2004
15 years 6 months ago
High-Level Goal Recognition in a Wireless LAN
Plan recognition has traditionally been developed for logically encoded application domains with a focus on logical reasoning. In this paper, we present an integrated plan-recogni...
Jie Yin, Xiaoyong Chai, Qiang Yang
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 5 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
ICPR
2002
IEEE
16 years 6 months ago
Recognizing Emphysema- A Neural Network Approach
An accurate and fully automatic method for detecting and quantifying emphysema in CT-images is presented. The method is based on an image preprocessing step followed by a neural n...
Hans Knutsson, Magnus Borga, Mikael Lundberg, Ola ...