Sciweavers

3257 search results - page 165 / 652
» networking 2004
Sort
View
PST
2004
15 years 2 months ago
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring
In this paper we present a new approach to stateful intrusion detection. It is based on a temporal logic which has the capability to express temporary properties, which are propert...
Mathieu Couture, Béchir Ktari, Mohamed Mejr...
90
Voted
CN
2004
79views more  CN 2004»
15 years 20 days ago
Improving the accuracy of cell-based positioning for wireless networks
The location-sensing technology is a core technology of location-based services and applications. In this paper, we present a location-sensing method, called as cell-based positio...
Rong-Hong Jan, Hung-Chi Chu, Yi-Fang Lee
101
Voted
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
15 years 7 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
99
Voted
EUROPAR
2004
Springer
15 years 6 months ago
Understanding Buffer Management for Cut-Through 1D Rings
Abstract. This paper describes the impact that buffer management has on network performance for a cut-through 1D ring. Such network provides only one routing alternative between ea...
Cruz Izu, Ramón Beivide
117
Voted
MWCN
2004
Springer
15 years 6 months ago
Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks
Abstract In this paper, our objective is to study and understand the mutual effects between the group communication protocols and unicast sessions in mobile ad hoc networks. The mo...
Lap Kong Law, Srikanth V. Krishnamurthy, Michalis ...