Sciweavers

459 search results - page 53 / 92
» Detecting Spam at the Network Level
Sort
View
CN
2004
106views more  CN 2004»
13 years 7 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
ICRA
2008
IEEE
146views Robotics» more  ICRA 2008»
14 years 2 months ago
Exploration of an incremental suite of microscopic models for acoustic event monitoring using a robotic sensor network
— Simulation is frequently used in the study of multi-agent systems. Unfortunately, in many cases, it is not necessarily clear how faithfully the details of the simulated model r...
Christopher M. Cianci, Jim Pugh, Alcherio Martinol...
INFOCOM
2008
IEEE
14 years 2 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
IJHPCA
2002
99views more  IJHPCA 2002»
13 years 7 months ago
Semantic Information Fusion for Coordinated Signal Processing in Mobile Sensor Networks
Distributed cognition of dynamic processes is commonly observed in mobile groups of animates like schools of fish, hunting lions, or in human teams for sports or military maneuvers...
David Friedlander, Shashi Phoha
SAC
2008
ACM
13 years 7 months ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....