Sciweavers

450 search results - page 63 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
AINA
2010
IEEE
15 years 2 months ago
Encoding and Compression for the Devices Profile for Web Services
—Most solutions for Wireless Sensor Networks (WSN) come equipped with their own architectural concepts which raise the problem of possible incompatibility of computer networks an...
Guido Moritz, Dirk Timmermann, Regina Stoll, Frank...
IWCMC
2006
ACM
15 years 3 months ago
Titan: a new paradigm in wireless internet access based on community collaboration
This paper introduces project TITAN, which investigates an alternative construct of residential broadband access. The aim of the project is to increase the utilisation of deployed...
Björn Landfeldt, Jahan Hassan, Albert Y. Zoma...
INFOSCALE
2006
ACM
15 years 3 months ago
PENS: an algorithm for density-based clustering in peer-to-peer systems
Huge amounts of data are available in large-scale networks of autonomous data sources dispersed over a wide area. Data mining is an essential technology for obtaining hidden and v...
Mei Li, Guanling Lee, Wang-Chien Lee, Anand Sivasu...
CCS
2009
ACM
15 years 1 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
COMCOM
2004
94views more  COMCOM 2004»
14 years 9 months ago
An economic model for the radio resource management in multimedia wireless systems
In this paper, we study the connection between Radio Resource Management and economic parameters, whose application in multimedia communication system is a challenging task. In fa...
Leonardo Badia, Magnus Lindström, Jens Zander...