Sciweavers

3222 search results - page 591 / 645
» Decentralized Network Analysis: A Proposal
Sort
View
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 11 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
13 years 11 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...
DIMVA
2007
13 years 11 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
MBEES
2007
13 years 11 months ago
Towards Tool Support for Service-Oriented Development of Embedded Automotive Systems
: The development of embedded systems is a challenging task because of the distributed, reactive and real-time nature of such systems. Distribution of embedded components across bu...
Vina Ermagan, To-ju Huang, Ingolf H. Krüger, ...
SDM
2007
SIAM
73views Data Mining» more  SDM 2007»
13 years 11 months ago
Sketching Landscapes of Page Farms
The Web is a very large social network. It is important and interesting to understand the “ecology” of the Web: the general relations of Web pages to their environment. The un...
Bin Zhou 0002, Jian Pei