Sciweavers

2316 search results - page 81 / 464
» How Asymmetric Is the Internet
Sort
View
NDSS
1997
IEEE
14 years 2 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
WCNC
2010
IEEE
14 years 1 months ago
Global Grassroots WiFi Sharing
— Access point sharing communities are an attractive solution for low-cost global mobile Internet access. However, existing communities all require a central authority in form of...
Wolfgang Kieß, Till Elsner, Björn Scheu...
EWSN
2006
Springer
14 years 9 months ago
Extending Network Lifetime Using an Automatically Tuned Energy-Aware MAC Protocol
Abstract. Sensor network devices have limited battery resources primarily consumed by radio communication. Network nodes play different communication roles and consequently consume...
Rebecca Braynard, Adam Silberstein, Carla Schlatte...
CLUSTER
2009
IEEE
14 years 4 months ago
Integrating software distributed shared memory and message passing programming
Abstract—Software Distributed Shared Memory (SDSM) systems provide programmers with a shared memory programming environment across distributed memory architectures. In contrast t...
H'sien J. Wong, Alistair P. Rendell
INCDM
2009
Springer
96views Data Mining» more  INCDM 2009»
14 years 4 months ago
Ordinal Evaluation: A New Perspective on Country Images
We present a novel use of ordinal evaluation (OrdEval) algorithm as a promising technique to study various marketing phenomena. OrdEval algorithm has originated in data mining and ...
Marko Robnik-Sikonja, Kris Brijs, Koen Vanhoof