Sciweavers

14824 search results - page 2725 / 2965
» Security - Introduction
Sort
View
135
Voted
IOR
2008
148views more  IOR 2008»
15 years 2 months ago
A Game-Theoretic Approach to Efficient Power Management in Sensor Networks
Wireless sensor networks pose numerous fundamental coordination problems. For instance, in a number of application domains including homeland security, environmental monitoring an...
Enrique Campos-Náñez, Alfredo Garcia...
IPL
2008
72views more  IPL 2008»
15 years 2 months ago
Reducing communication costs in robust peer-to-peer networks
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robust to adversarial attack via Byzantine faults. Unfortunately, all of these resul...
Jared Saia, Maxwell Young
COMCOM
2007
94views more  COMCOM 2007»
15 years 2 months ago
Distributed inter-domain lightpath provisioning in the presence of wavelength conversion
Dense wavelength division multiplexing (DWDM) has become the dominant transport layer technology for next-generation backbone networks due to its unprecedented capacity scalabilit...
Qing Liu, Nasir Ghani, Nageswara S. V. Rao, Ashwin...
IJDSN
2006
136views more  IJDSN 2006»
15 years 2 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
COMPSEC
2007
52views more  COMPSEC 2007»
15 years 2 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari
« Prev « First page 2725 / 2965 Last » Next »