Sciweavers

478 search results - page 14 / 96
» A new approach to auctions and resilient mechanism design
Sort
View
JSAC
2006
127views more  JSAC 2006»
13 years 7 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
DIMVA
2008
13 years 9 months ago
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
Abstract. This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) c...
Prithvi Bisht, V. N. Venkatakrishnan
EUROPAR
2008
Springer
13 years 9 months ago
Auction Protocols for Resource Allocations in Ad-Hoc Grids
Abstract. Different auction-based approaches have been used to allocate resources in Grids, but none of them provide the design choice for a specific economic model while consideri...
Behnaz Pourebrahimi, Koen Bertels
CORR
2006
Springer
81views Education» more  CORR 2006»
13 years 7 months ago
Modeling Aspect Mechanisms: A Top-Down Approach
A plethora of aspect mechanisms exist today. All of these diverse mechanisms integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a char...
Sergei Kojarski, David H. Lorenz
TKDE
2011
528views more  TKDE 2011»
13 years 2 months ago
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
—The current peer-to-peer (P2P) content distribution systems are constricted by their simple on-demand content discovery mechanism. The utility of these systems can be greatly en...
Lakshmish Ramaswamy, Jianxia Chen