Sciweavers

3467 search results - page 525 / 694
» A New Localized Network Based Routing Model in Computer and ...
Sort
View
DIMVA
2004
13 years 9 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
ISNN
2005
Springer
14 years 1 months ago
ICA and Committee Machine-Based Algorithm for Cursor Control in a BCI System
In recent years, brain-computer interface (BCI) technology has emerged very rapidly. Brain-computer interfaces (BCIs) bring us a new communication interface technology which can tr...
Jianzhao Qin, Yuanqing Li, Andrzej Cichocki
JCS
2011
126views more  JCS 2011»
13 years 3 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
IMSCCS
2006
IEEE
14 years 2 months ago
Collaborative Peer-to-Peer Service for Information Sharing Using JXTA
Peer-to-Peer (P2P) file sharing networks attract much attention from legal and research communities. The success and popularity of P2P networks provides a new paradigm for sharing...
Hao Shi, Yanchun Zhang, Jingyuan Zhang, Elizabeth ...
CCS
2005
ACM
14 years 1 months ago
Countering DoS attacks with stateless multipath overlays
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that at...
Angelos Stavrou, Angelos D. Keromytis