Sciweavers

214 search results - page 12 / 43
» Digital Secure-Communication Using Robust Hyper-Chaotic Syst...
Sort
View
CCR
2005
97views more  CCR 2005»
13 years 7 months ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin
IPSN
2004
Springer
14 years 1 months ago
Lattice sensor networks: capacity limits, optimal routing and robustness to failures
We study network capacity limits and optimal routing algorithms for regular sensor networks, namely, square and torus grid sensor networks, in both, the static case (no node failu...
Guillermo Barrenechea, Baltasar Beferull-Lozano, M...
ETS
2002
IEEE
144views Hardware» more  ETS 2002»
13 years 7 months ago
Creating Shared Knowledge: Instructional Knowledge Management Systems
Document management, information management, and knowledge management are three processes of an instructional knowledge management system (IKMS) that require different ways of thi...
Gerald S. Edmonds, Rob Pusch
PAMI
1998
137views more  PAMI 1998»
13 years 7 months ago
Registration and Integration of Multiple Object Views for 3D Model Construction
—Automatic 3D object model construction is important in applications ranging from manufacturing to entertainment, since CAD models of existing objects may be either unavailable o...
Chitra Dorai, Gang Wang, Anil K. Jain, Carolyn R. ...
SASN
2004
ACM
14 years 1 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...