Sciweavers

1585 search results - page 147 / 317
» Automatically optimizing secure computation
Sort
View
ACII
2007
Springer
14 years 4 days ago
Affective Text Variation and Animation for Dynamic Advertisement
Abstract. The largest part of the advertising market is already electronic. This means there is an opportunity for automatizing some of the production processes, such as producing ...
Carlo Strapparava, Alessandro Valitutti, Oliviero ...
ADHOCNETS
2009
Springer
14 years 23 days ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
ICDCS
2003
IEEE
14 years 1 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
AINA
2007
IEEE
14 years 2 months ago
Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services
In recent years a movement from distributed systems controlled by users to automatic, autonomous and self-configuring distributed systems is noticeable. Web services is one approa...
Elmar Zeeb, Andreas Bobek, Hendrik Bohn, Frank Gol...
NDSS
1998
IEEE
14 years 11 days ago
Distributed Algorithms for Attack Localization in All-Optical Networks
All-Optical Networks provide ultra-fast data rates, but present a new set of challenges for network security. We present a new algorithm for attack localization in networks. The a...
Ruth Bergman, Muriel Médard, Serena Chan