Sciweavers

14824 search results - page 2766 / 2965
» Security - Introduction
Sort
View
104
Voted
PIMRC
2010
IEEE
14 years 9 months ago
The role of channel states in secret key generation
In this work, we investigate secret key generation from channel states. We point out, by means of a packet-delaybased attack, that observing its own channel states is not the only ...
Xiang He, Aylin Yener
PPDP
2010
Springer
14 years 9 months ago
Tabling for transaction logic
Transaction Logic is a logic for representing declarative and procedural knowledge in logic programming, databases, and AI. It has been successful in areas as diverse as workflows...
Paul Fodor, Michael Kifer
RAID
2010
Springer
14 years 9 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
97
Voted
SASO
2010
IEEE
14 years 9 months ago
VCAE: A Virtualization and Consolidation Analysis Engine for Large Scale Data Centers
Server consolidation through virtualization is becoming an effective way to save power and space in enterprise data centers. However, it also brings additional operational risks f...
Haifeng Chen, Hui Kang, Guofei Jiang, Kenji Yoshih...
89
Voted
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
14 years 9 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
« Prev « First page 2766 / 2965 Last » Next »