Sciweavers

6279 search results - page 960 / 1256
» Studies in Solution Sampling
Sort
View
156
Voted
WCNC
2008
IEEE
15 years 11 months ago
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET
—In this paper, we study the election of multiple leaders for intrusion detection in the presence of selfish nodes in mobile ad hoc networks (MANETs). To balance the resource co...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
WETICE
2008
IEEE
15 years 11 months ago
Towards Making WSRF Based Web Services Strongly Mobile
: Grid Services became a widely used technology for building service oriented applications. The Web Service Resource Framework (WSRF) is the current standard used for building such...
Soumaya Marzouk, Mohamed Jmaiel
118
Voted
ADHOCNOW
2008
Springer
15 years 11 months ago
Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes
In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simpl...
Katarzyna Kosek, Marek Natkaniec, Andrzej R. Pach
ACSAC
2007
IEEE
15 years 11 months ago
Secure Input for Web Applications
The web is an indispensable part of our lives. Every day, millions of users purchase items, transfer money, retrieve information and communicate over the web. Although the web is ...
Martin Szydlowski, Christopher Kruegel, Engin Kird...
AINA
2007
IEEE
15 years 11 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...