Sciweavers

1586 search results - page 78 / 318
» Integrated Network Experimentation using Simulation and Emul...
Sort
View
CASES
2010
ACM
14 years 8 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
IJIIDS
2008
95views more  IJIIDS 2008»
14 years 10 months ago
Tightly-coupled GIS data in GNSS fix computations with integrity testing
: Global Navigation Satellite Systems (GNSS) are often used to localise a receiver with respect to a given map. This association problem, also known as map-matching, is usually add...
Clément Fouque, Philippe Bonnifait
CONEXT
2008
ACM
14 years 11 months ago
Distributed event delivery model for collaborative virtual simulations
Networked Virtual Environments (NVEs) are computer generated, synthetic worlds that allow simultaneous interactions of multiple participants. IP multicast and application layer mu...
Neha Singh, S. Sudarshan
BMCBI
2006
202views more  BMCBI 2006»
14 years 10 months ago
Integrated biclustering of heterogeneous genome-wide datasets for the inference of global regulatory networks
Background: The learning of global genetic regulatory networks from expression data is a severely under-constrained problem that is aided by reducing the dimensionality of the sea...
David J. Reiss, Nitin S. Baliga, Richard Bonneau
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 4 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee