Sciweavers

46931 search results - page 9264 / 9387
» Networking the networks
Sort
View
COMCOM
2006
88views more  COMCOM 2006»
14 years 11 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
COMPLEXITY
2006
91views more  COMPLEXITY 2006»
14 years 11 months ago
The evolution of technology within a simple computer model
Technology--the collection of devices and methods available to human society--evolves by constructing new devices and methods from ones that previously exist, and in turn offering...
W. Brian Arthur, Wolfgang Polak
COMSUR
2006
84views more  COMSUR 2006»
14 years 11 months ago
A survey of handover algorithms in DVB-H
Digital Video Broadcasting for Handhelds (DVB-H) is a standard for broadcasting IP Datacast (IPDC) services to mobile handheld terminals. Based on the DVB-T standard, DVB-H adds n...
Xiaodong Yang, Jani Väre, Thomas J. Owens
CORR
2006
Springer
169views Education» more  CORR 2006»
14 years 11 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
CORR
2006
Springer
82views Education» more  CORR 2006»
14 years 11 months ago
Rate Regions for Relay Broadcast Channels
A partially cooperative relay broadcast channel (RBC) is a three-node network with one source node and two destination nodes (destinations 1 and 2) where destination 1 can act as a...
Yingbin Liang, Gerhard Kramer
« Prev « First page 9264 / 9387 Last » Next »