Sciweavers

298 search results - page 5 / 60
» Computer security: quality rather than quantity
Sort
View
LATIN
2010
Springer
14 years 4 months ago
Some Observations on Holographic Algorithms
Abstract. We define the notion of diversity for families of finite functions, and express the limitations of a simple class of holographic algorithms in terms of limitations on d...
Leslie G. Valiant
EELC
2006
156views Languages» more  EELC 2006»
14 years 1 months ago
The Human Speechome Project
The Human Speechome Project is an effort to observe and computationally model the longitudinal course of language development for a single child at an unprecedented scale. The ide...
Deb Roy, Rupal Patel, Philip DeCamp, Rony Kubat, M...
WCNC
2008
IEEE
14 years 4 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
EUC
2005
Springer
14 years 3 months ago
Asymmetry-Aware Link Quality Services in Wireless Sensor Networks
Recent studies in wireless sensor networks (WSN) have observed that the irregular link quality is a common phenomenon, rather than an anomaly. The irregular link quality, especiall...
Junzhao Du, Weisong Shi, Kewei Sha
ECSA
2010
Springer
13 years 10 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...