Sciweavers

1051 search results - page 181 / 211
» Secure Continuity for Sensor Networks
Sort
View
CISIS
2009
IEEE
15 years 6 months ago
New Physiological Biometrics Based on Human Cognitive Factors
Modeling and quantifying different human factors continue to be one of the major challenges in introducing new biometric systems. For example, drivers of some of our behavior diļ...
Omar Hamdy, Issa Traore
MTA
2010
118views more  MTA 2010»
14 years 10 months ago
A computation-oriented multimedia data streams model for content-based information retrieval
: Multimedia applications nowadays are becoming prevalent. In the past the relational database model was generalized to the multimedia database model. More recently the relational ...
Shi-Kuo Chang, Lei Zhao, Shenoda Guirguis, Rohit K...
CORR
2012
Springer
182views Education» more  CORR 2012»
13 years 7 months ago
Organizing the Aggregate: Languages for Spatial Computing
As the number of computing devices embedded into engineered systems continues to rise, there is a widening gap between the needs of the user to control aggregates of devices and t...
Jacob Beal, Stefan Dulman, Kyle Usbeck, Mirko Viro...
ACSAC
2007
IEEE
15 years 6 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ESAS
2007
Springer
15 years 6 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...