Sciweavers

1683 search results - page 286 / 337
» Power Management in Networked Devices
Sort
View
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 9 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
JASIS
2011
110views more  JASIS 2011»
14 years 21 days ago
A material history of bits
In both the popular press and scholarly research, digital information is persistently discussed in terms that imply its immateriality. In this characterization, the digital derive...
Jean-François Blanchette
JCST
2010
119views more  JCST 2010»
14 years 8 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
SIGMOD
2011
ACM
297views Database» more  SIGMOD 2011»
14 years 19 days ago
Graph cube: on warehousing and OLAP multidimensional networks
We consider extending decision support facilities toward large sophisticated networks, upon which multidimensional attributes are associated with network entities, thereby forming...
Peixiang Zhao, Xiaolei Li, Dong Xin, Jiawei Han
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 3 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...