Sciweavers

1647 search results - page 209 / 330
» Distributing private data in challenged network environments
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
IPPS
2007
IEEE
15 years 10 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
MOBICOM
2012
ACM
13 years 7 months ago
FLIGHT: clock calibration using fluorescent lighting
In this paper, we propose a novel clock calibration approach called FLIGHT, which leverages the fact that the fluorescent light intensity changes with a stable period that equals...
Zhenjiang Li, Wenwei Chen, Cheng Li, Mo Li, Xiang-...
134
Voted
CONCURRENCY
2004
77views more  CONCURRENCY 2004»
15 years 4 months ago
Grids of agents for computer and telecommunication network management
The centralized system approach for computer and telecommunication network management has been presenting scalability problems along with the growth in the number and diversity of...
Marcos Dias de Assunção, Fernando Lu...
145
Voted
IPPS
2006
IEEE
15 years 10 months ago
Performance evaluation of wormhole routed network processor-memory interconnects
Network line cards are experiencing ever increasing line rates, random data bursts, and limited space. Hence, they are more vulnerable than other processormemory environments, to ...
Taskin Koçak, Jacob Engel