Sciweavers

2656 search results - page 63 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
PARA
2000
Springer
15 years 3 months ago
Ship Hull Hydrodynamic Analysis Using Distributed Shared Memory
Abstract. In this article we present the results obtained from the execution of a commercial Computational Fluid Dynamics program on a cluster of personal computers. The communicat...
João P. Marques Silva, Paulo Guedes
CCS
2004
ACM
15 years 5 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
PERCOM
2005
ACM
15 years 11 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
INFOCOM
2011
IEEE
14 years 3 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
INFORMATICALT
2002
131views more  INFORMATICALT 2002»
14 years 11 months ago
An Agent-Based Architecture for Customer Services Management and Product Search
The amount of products and services available over the Internet increases significantly and it soon becomes beyond users ability to analyze and compare them. At the same time the n...
Thomas Heiberg, Mihhail Matskin, Jøran Pede...