Sciweavers

1875 search results - page 358 / 375
» Automatic Network Protocol Analysis
Sort
View
130
Voted
CN
2007
117views more  CN 2007»
15 years 2 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
128
Voted
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 2 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
INFOCOM
2010
IEEE
15 years 26 days ago
Neighbor Discovery with Reception Status Feedback to Transmitters
—Neighbor discovery is essential for the process of self-organization of a wireless network, where almost all routing and medium access protocols need knowledge of one-hop neighb...
Ramin Khalili, Dennis Goeckel, Donald F. Towsley, ...
119
Voted
EUROSYS
2008
ACM
15 years 11 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
AIED
2005
Springer
15 years 8 months ago
Discovery of Patterns in Learner Actions
This paper describes an approach for analysis of computer-supported learning processes utilizing logfiles of learners’ actions. We provide help to researchers and teachers in ...
Andreas Harrer, Michael Vetter, Stefan Thür, ...