Sciweavers

1191 search results - page 170 / 239
» Distributed Detection of Information Flows
Sort
View
CONEXT
2009
ACM
13 years 8 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
SIGMOD
2008
ACM
198views Database» more  SIGMOD 2008»
14 years 7 months ago
Efficient storage scheme and query processing for supply chain management using RFID
As the size of an RFID tag becomes smaller and the price of the tag gets lower, RFID technology has been applied to a wide range of areas. Recently, RFID has been adopted in the b...
Chun-Hee Lee, Chin-Wan Chung
PERCOM
2003
ACM
14 years 7 months ago
Energy-Aware Target Localization in Wireless Sensor Networks
Wireless distributed sensor networks (DSNs) are important for a number of strategic applications such as coordinated target detection, surveillance, and localization. Energy is a ...
Yi Zou, Krishnendu Chakrabarty
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 2 months ago
A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE 802.11 DCF
— The CSMA/CA protocols are designed under the assumption that all participant nodes would abide to the protocol rules. This is of particular importance in distributed protocols ...
Alberto López Toledo, Xiaodong Wang
CCS
2007
ACM
14 years 1 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...