Sciweavers

1462 search results - page 151 / 293
» The Abstract MAC Layer
Sort
View
ADHOCNOW
2006
Springer
15 years 11 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
KES
2005
Springer
15 years 10 months ago
A Network Service Access Control Framework Based on Network Blocking Algorithm
Abstract. Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network service. In this paper, we propo...
Jahwan Koo, Seong-Jin Ahn
119
Voted
OTM
2005
Springer
15 years 10 months ago
Shelter from the Storm: Building a Safe Archive in a Hostile World
Abstract. The storing of data and configuration files related to scientific experiments is vital if those experiments are to remain reproducible, or if the data is to be shared ...
Jon MacLaren, Gabrielle Allen, Chirag Dekate, Dayo...
ICES
2005
Springer
121views Hardware» more  ICES 2005»
15 years 10 months ago
Hardware Platforms for MEMS Gyroscope Tuning Based on Evolutionary Computation Using Open-Loop and Closed-Loop Frequency Respons
Abstract. We propose a tuning method for MEMS gyroscopes based on evolutionary computation to efficiently increase the sensitivity of MEMS gyroscopes through tuning. The tuning met...
Didier Keymeulen, Michael I. Ferguson, Wolfgang Fi...
ACISP
2003
Springer
15 years 10 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon