Sciweavers

1718 search results - page 236 / 344
» Communicating more than nothing
Sort
View
CCS
2007
ACM
14 years 3 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
ICCS
2007
Springer
14 years 3 months ago
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Cao Trong Hieu, Choong Seon Hong
MDM
2007
Springer
106views Communications» more  MDM 2007»
14 years 3 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
MDM
2007
Springer
14 years 3 months ago
State-Filters for Enhanced Filtering in Sensor-Based Publish/Subscribe Systems
—Publish/Subscribe systems have been extensively studied in the context of distributed information-based systems, and have proven scalable in information-dissemination for many d...
Salman Taherian, Jean Bacon
PADL
2007
Springer
14 years 3 months ago
BAD, a Declarative Logic-Based Language for Brain Modeling
Abstract. We describe a declarative language, called BAD (brain architecture description language), which we have developed for describing and then running brain models. Models are...
Alan H. Bond