Sciweavers

1278 search results - page 209 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
RECSYS
2010
ACM
13 years 9 months ago
Affiliation recommendation using auxiliary networks
Social network analysis has attracted increasing attention in recent years. In many social networks, besides friendship links amongst users, the phenomenon of users associating th...
Vishvas Vasuki, Nagarajan Natarajan, Zhengdong Lu,...
VTC
2008
IEEE
117views Communications» more  VTC 2008»
14 years 3 months ago
Remote Medical Monitoring Through Vehicular Ad Hoc Network
Several diseases and medical conditions require constant monitoring of physiological signals and vital signs on daily bases, such as diabetics, hypertension and etc. In order to m...
Hyduke Noshadi, Eugenio Giordano, Hagop Hagopian, ...
ISSA
2008
13 years 10 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
IPSN
2009
Springer
14 years 3 months ago
Approximating sensor network queries using in-network summaries
In this work we present new in-network techniques for communication efficient approximate query processing in wireless sensornets. We use a model-based approach that constructs a...
Alexandra Meliou, Carlos Guestrin, Joseph M. Helle...
IPPS
2002
IEEE
14 years 2 months ago
Reliable Communication in Faulty Star Networks
‘ We take advantage of the hierarchical structure of the star graph network to obtain an efficient method for constructing node-disjoint paths between arbitrary pairs of nodes in...
Khaled Day, Abdel Elah Al-Ayyoub