Sciweavers

1423 search results - page 238 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
NETWORK
2008
139views more  NETWORK 2008»
14 years 9 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao
RAS
2008
136views more  RAS 2008»
14 years 8 months ago
Action evaluation for mobile robot global localization in cooperative environments
This work is about solving the global localization issue for mobile robots operating in large and cooperative environments. It tackles the problem of estimating the pose of a robo...
Andreu Corominas Murtra, Josep Maria Mirats i Tur,...
CORR
2004
Springer
146views Education» more  CORR 2004»
14 years 9 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
ESAS
2005
Springer
15 years 3 months ago
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
Matija Puzar, Jon Andersson, Thomas Plagemann, Yve...
NDSS
2006
IEEE
15 years 3 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...