Sciweavers

3488 search results - page 643 / 698
» On Feedback for Network Coding
Sort
View
109
Voted
ATAL
2007
Springer
15 years 10 months ago
A formal model for situated semantic alignment
Ontology matching is currently a key technology to achieve the semantic alignment of ontological entities used by knowledge-based applications, and therefore to enable their inter...
Manuel Atencia, W. Marco Schorlemmer
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
115
Voted
IFIP
2007
Springer
15 years 10 months ago
Enhancing IEEE 802.11n WLANs using group-orthogonal code-division multiplex
The definition of the next generation of wireless networks is well under way within the IEEE 802.11 High Throughput Task Group committee. The resulting standard, to be called IEEE...
Guillem Femenias, Felip Riera-Palou
RAID
2007
Springer
15 years 10 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
114
Voted
ACSAC
2006
IEEE
15 years 10 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna