Sciweavers

12183 search results - page 49 / 2437
» Computers under Attacks!
Sort
View
ADHOC
2007
115views more  ADHOC 2007»
13 years 10 months ago
Modeling adaptive node capture attacks in multi-hop wireless networks
We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev–Yao model are know...
Patrick Tague, Radha Poovendran
KR
2010
Springer
13 years 7 months ago
Computing Inconsistency Measurements under Multi-Valued Semantics by Partial Max-SAT Solvers
Measuring the inconsistency degree of a knowledge base can help us to deal with inconsistencies. Several inconsistency measures have been given under different multi-valued semant...
Guohui Xiao, Zuoquan Lin, Yue Ma, Guilin Qi
NC
2011
201views Neural Networks» more  NC 2011»
13 years 4 months ago
The computational power of membrane systems under tight uniformity conditions
We apply techniques from complexity theory to a model of biological cellular membranes known as membrane systems or P-systems. Like Boolean circuits, membrane systems are defined ...
Niall Murphy, Damien Woods
WAN
1998
Springer
14 years 2 months ago
Advanced Computing and Communications Research under NSF Support
This paper discusses the research initiatives and programs supported by the National Science Foundation to promote high-end computing and largescale networking. This work mainly fa...
S. Kamal Abdali
WWW
2004
ACM
14 years 10 months ago
Outlink estimation for pagerank computation under missing data
The enormity and rapid growth of the web-graph forces quantities such as its pagerank to be computed under missing information consisting of outlinks of pages that have not yet be...
Sreangsu Acharyya, Joydeep Ghosh