Sciweavers

2057 search results - page 231 / 412
» From content distribution networks to content networks - iss...
Sort
View
GAMESEC
2010
150views Game Theory» more  GAMESEC 2010»
13 years 6 months ago
Adversarial Control in a Delay Tolerant Network
We consider a multi-criteria control problem that arises in a delay tolerant network with two adversarial controllers: the source and the jammer. The source's objective is to ...
Eitan Altman, Tamer Basar, Veeraruna Kavitha
ICASSP
2011
IEEE
12 years 12 months ago
Online anomaly detection with expert system feedback in social networks
In this paper, we propose examining the participants in various meetings or communications within a social network, and using sequential inference based on these participant lists...
Corinne Horn, Rebecca Willett
CCS
2011
ACM
12 years 8 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
ECSCW
2011
12 years 8 months ago
Digital Traces of Interest: Deriving Interest Relationships from Social Media Interactions
Facebook and Twitter have changed the way we consume information, allowing the people we follow to become our “social filters” and determine the content of our information stre...
Michal Jacovi, Ido Guy, Inbal Ronen, Adam Perer, E...
INFOCOM
2009
IEEE
14 years 2 months ago
MobTorrent: A Framework for Mobile Internet Access from Vehicles
Abstract—In this paper, we present MobTorrent, an ondemand, user-driven framework designed for vehicles which have intermittent high speed access to roadside WiFi access points (...
Bin Bin Chen, Mun Choon Chan