Sciweavers

1737 search results - page 185 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
98
Voted
PERCOM
2010
ACM
15 years 3 months ago
Crowd-sourcing world models with OpenRoomMap
Abstract—The construction of world models typically requires laborious survey and cataloguing of a building’s contents. OpenRoomMap attempts to crowd-source this information by...
Andrew Colin Rice, Oliver J. Woodman
160
Voted
WCNC
2010
IEEE
15 years 9 months ago
Optimality of Diagonalization of Multicarrier Multi-Hop Linear Non-Regenerative MIMO Relays
Abstract—In this paper, a multicarrier multi-hop multipleinput multiple-output (MIMO) relay system is investigated. A linear non-regenerative strategy is applied at each relay no...
Yue Rong, Yingbo Hua
INFOCOM
2006
IEEE
15 years 11 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
HPDC
2003
IEEE
15 years 10 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
ACSAC
2007
IEEE
15 years 11 months ago
Routing in the Dark: Pitch Black
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...