Sciweavers

1328 search results - page 259 / 266
» Common Knowledge
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
JCS
2010
104views more  JCS 2010»
13 years 7 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 7 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
KI
2010
Springer
13 years 7 months ago
Spatial Cognition: Reasoning, Action, Interaction
ut spatial environments, be it real or abstract, human or machine. Research issues range from human spatial cognition to mobile robot navigation. Numerous results have been obtaine...
Christian Freksa, Holger Schultheis, Kerstin Schil...
LOGCOM
2010
158views more  LOGCOM 2010»
13 years 7 months ago
Applying Universal Algebra to Lambda Calculus
The aim of this paper is double. From one side we survey the knowledge we have acquired these last ten years about the lattice of all λ-theories (= equational extensions of untype...
Giulio Manzonetto, Antonino Salibra