Sciweavers

172 search results - page 33 / 35
» Key agreement from weak bit agreement
Sort
View
PODC
2011
ACM
13 years 1 months ago
Structuring unreliable radio networks
In this paper we study the problem of building a connected dominating set with constant degree (CCDS) in the dual graph radio network model [4,9,10]. This model includes two types...
Keren Censor-Hillel, Seth Gilbert, Fabian Kuhn, Na...
ICDCS
2006
IEEE
14 years 5 months ago
SysProf: Online Distributed Behavior Diagnosis through Fine-grain System Monitoring
Runtime monitoring is key to the effective management of enterprise and high performance applications. To deal with the complex behaviors of today’s multi-tier applications runn...
Sandip Agarwala, Karsten Schwan
ICDM
2006
IEEE
102views Data Mining» more  ICDM 2006»
14 years 5 months ago
Who Thinks Who Knows Who? Socio-cognitive Analysis of Email Networks
Interpersonal interaction plays an important role in organizational dynamics, and understanding these interaction networks is a key issue for any organization, since these can be ...
Nishith Pathak, Sandeep Mane, Jaideep Srivastava
WS
2004
ACM
14 years 4 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
SACMAT
2003
ACM
14 years 4 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel