Sciweavers

346 search results - page 50 / 70
» Can we trust docking results
Sort
View
GLOBECOM
2010
IEEE
13 years 5 months ago
Attack-Resistant Collaboration in Wireless Video Streaming Social Networks
Users using the same video streaming service within a wireless network share the same limited backbone bandwidth to the Internet. These users are motivated to collaborate with eac...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
LION
2007
Springer
113views Optimization» more  LION 2007»
14 years 1 months ago
Limited-Memory Techniques for Sensor Placement in Water Distribution Networks
Abstract. The practical utility of optimization technologies is often impacted by factors that reflect how these tools are used in practice, including whether various real-world c...
William E. Hart, Jonathan W. Berry, Erik G. Boman,...
MSN
2007
Springer
161views Sensor Networks» more  MSN 2007»
14 years 1 months ago
SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks
To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process ...
Chakib Bekara, Maryline Laurent-Maknavicius, Kheir...
CCS
2009
ACM
14 years 2 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu