People search for people with suitable expertise all of the time in their social networks – to answer questions or provide help. Recently, efforts have been made to augment this...
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
We propose CaliBree, a self-calibration system for mobile wireless sensor networks. Sensors calibration is a fundamental problem in a sensor network. If sensor devices are not prop...
Emiliano Miluzzo, Nicholas D. Lane, Andrew T. Camp...
This paper describes a study in the evolution of cooperative behavior, specifically the construction of communication networks, through digital evolution and multilevel selection...
David B. Knoester, Philip K. McKinley, Charles Ofr...