Sciweavers

1102 search results - page 138 / 221
» Interference and Communications among Active Network Applica...
Sort
View
78
Voted
IMC
2006
ACM
15 years 6 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
ESORICS
2006
Springer
15 years 4 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
122
Voted
COMCOM
2006
154views more  COMCOM 2006»
15 years 24 days ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
103
Voted
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 7 months ago
Distributed Innovation in Classes of Networks
Rapid developments in digital technologies have brought to force new challenges in innovation. In this paper, we propose a taxonomic framework of innovation networks in order to i...
Youngjin Yoo, Kalle Lyytinen, Richard J. Boland Jr...
117
Voted
MOBICOM
2004
ACM
15 years 6 months ago
Using code collection to support large applications on mobile devices
The progress of mobile device technology unfolds a new spectrum of applications that challenges conventional infrastructure models. Most of these devices are perceived by their us...
Lucian Popa 0002, Irina Athanasiu, Costin Raiciu, ...