Sciweavers

2913 search results - page 403 / 583
» How Much to Copy
Sort
View
SASN
2003
ACM
14 years 2 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee
SIGIR
2003
ACM
14 years 2 months ago
Re-examining the potential effectiveness of interactive query expansion
Much attention has been paid to the relative effectiveness of interactive query expansion versus automatic query expansion. Although interactive query expansion has the potential ...
Ian Ruthven
WPES
2003
ACM
14 years 2 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...
AI
2003
Springer
14 years 2 months ago
Hybrid Randomised Neighbourhoods Improve Stochastic Local Search for DNA Code Design
Sets of DNA strands that satisfy combinatorial constraints play an important role in various approaches to biomolecular computation, nanostructure design, and molecular tagging. Th...
Dan C. Tulpan, Holger H. Hoos
ASIACRYPT
2003
Springer
14 years 2 months ago
Leakage-Resilient Authenticated Key Establishment Protocols
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we revi...
SeongHan Shin, Kazukuni Kobara, Hideki Imai