Sciweavers

2916 search results - page 544 / 584
» The simulation power of automod
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 4 months ago
MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks
Wireless sensor applications (WSNs) are often required to simultaneously satisfy conflicting operational objectives (e.g., latency and power consumption). Based on an observation...
Pruet Boonma, Junichi Suzuki
ICYCS
2008
IEEE
15 years 4 months ago
FAST CASH: FAir and STable Channel ASsignment on Heterogeneous Wireless Mesh Network
— Nowadays wireless mesh routers are facilitating with more wireless channels than ever because of the advanced wireless communication technologies such as OFDM, SDR and CR(cogni...
Panlong Yang, Guihai Chen
INFOCOM
2008
IEEE
15 years 4 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
ISPAN
2008
IEEE
15 years 4 months ago
M-Ring: A Distributed, Self-Organized, Load-Balanced Communication Method on Super Peer Network
- Many peer-to-peer file sharing systems have been proposed to take the locality and heterogeneity into account. The two-layered architecture is one of the most widespread systems ...
Tsung-Han Lin, Tsung-Hsuan Ho, Yu-Wei Chan, Yeh-Ch...