Sciweavers

908 search results - page 173 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
STORAGESS
2005
ACM
15 years 3 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
CORR
2007
Springer
146views Education» more  CORR 2007»
14 years 9 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...
WINET
2008
81views more  WINET 2008»
14 years 9 months ago
Interference power statistics in ad-hoc and sensor networks
Abstract There exist accurate calculation methods for estimation of interference power sum statistics in fixedtopology wireless networks based on the log-normal shadowing radio mod...
Ramin Hekmat, Piet Van Mieghem
MASCOTS
2010
14 years 11 months ago
On the Universal Generation of Mobility Models
Mobility models have traditionally been tailored to specific application domains such as human, military, or ad hoc transportation scenarios. This tailored approach often renders a...
Alberto Medina, Gonca Gursun, Prithwish Basu, Ibra...
ICWS
2004
IEEE
14 years 10 months ago
Provisioning Resilient, Adaptive Web Services-based Workflow: A Semantic Modeling Approach
Web Services are emerging technologies that enable application-to-application communication and reuse of autonomous services over the Web. Recent efforts, OWL-S, model the semanti...
Chintan Patel, Kaustubh Supekar, Yugyung Lee