Sciweavers

1737 search results - page 87 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
INFOCOM
2010
IEEE
14 years 9 months ago
Surfing the Blogosphere: Optimal Personalized Strategies for Searching the Web
We propose a distributed mechanism for finding websurfing strategies that is inspired by the StumbleUpon recommendation engine. Each day, a websurfer visits a sequence of websites ...
Stratis Ioannidis, Laurent Massoulié
ADHOCNOW
2005
Springer
15 years 5 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
INFOCOM
2010
IEEE
14 years 10 months ago
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
—Neighbor discovery is a fundamental requirement and need be done frequently in underwater acoustic networks (UANs) with floating node mobility. In hostile environments, neighbo...
Rui Zhang, Yanchao Zhang
IROS
2006
IEEE
149views Robotics» more  IROS 2006»
15 years 5 months ago
Tactile Measurement of Local Contact Geometry Using Soft Fingertip with Force/Torque Sensor
— We propose a new method of tactile sensing for a fingertip of robotic hand based on the analysis of the mechanical constraints imposed to the contact between the fingertip an...
Kouji Murakami, Tsutomu Hasegawa
SDM
2004
SIAM
211views Data Mining» more  SDM 2004»
15 years 1 months ago
Using Support Vector Machines for Classifying Large Sets of Multi-Represented Objects
Databases are a key technology for molecular biology which is a very data intensive discipline. Since molecular biological databases are rather heterogeneous, unification and data...
Hans-Peter Kriegel, Peer Kröger, Alexey Pryak...