Sciweavers

2244 search results - page 197 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
WISEC
2010
ACM
15 years 7 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
NDSS
2002
IEEE
15 years 7 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
158
Voted
IMC
2010
ACM
15 years 13 days ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...
129
Voted
WER
2005
Springer
15 years 8 months ago
Multi-Perspective Requirements Engineering for Networked Business Systems: A Framework for Pattern Composition
How business and software analysts explore, document, and negotiate requirements for enterprise systems is critical to the benefits their organizations will eventually derive. In t...
Zlatko Zlatev, Maya Daneva, Roel Wieringa
EMSOFT
2006
Springer
15 years 6 months ago
Defining a strategy to introduce a software product line using existing embedded systems
Engine Control Systems (ECS) for automobiles have numerous variants for many manufactures and different markets. To improve development efficiency, exploiting ECS commonalities an...
Kentaro Yoshimura, Dharmalingam Ganesan, Dirk Muth...