Sciweavers

209 search results - page 36 / 42
» Sensor Network Configuration Under Physical Attacks
Sort
View
IJISEC
2006
119views more  IJISEC 2006»
14 years 9 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
COMPCON
1995
IEEE
15 years 1 months ago
REINAS: the Real-Time Environmental Information Network and Analysis System
The Real-Time Environmental Information Network and Analysis System (REINAS) is a distributed system supporting the conduct of regional environmental science research at the desk ...
Darrell D. E. Long, Patrick E. Mantey, Craig M. Wi...
CODES
2008
IEEE
15 years 4 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
ICEGOV
2007
ACM
15 years 1 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
OSDI
2008
ACM
15 years 10 months ago
SR-IOV Networking in Xen: Architecture, Design and Implementation
SR-IOV capable network devices offer the benefits of direct I/O throughput and reduced CPU utilization while greatly increasing the scalability and sharing capabilities of the devi...
Yaozu Dong, Zhao Yu, Greg Rose