Sciweavers

622 search results - page 56 / 125
» Organizer's Report
Sort
View
ACSAC
2007
IEEE
15 years 6 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
DCOSS
2007
Springer
15 years 6 months ago
Localization for Anchoritic Sensor Networks
We introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due to, e.g., harsh environments, energy constraints, or...
Yuliy M. Baryshnikov, Jian Tan
QOSA
2007
Springer
15 years 6 months ago
Factors Influencing Industrial Practices of Software Architecture Evaluation: An Empirical Investigation
To support software architecture evaluation practices, several efforts have been made to provide a basis for comparing and assessing evaluation methods, document various best pract...
Muhammad Ali Babar, Len Bass, Ian Gorton
IWCMC
2006
ACM
15 years 5 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
INFOCOM
2003
IEEE
15 years 5 months ago
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks
— A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. The data ...
Seema Bandyopadhyay, Edward J. Coyle