Sciweavers

1801 search results - page 262 / 361
» Memory-Centric Security Architecture
Sort
View
IJNSEC
2006
205views more  IJNSEC 2006»
15 years 4 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
JSW
2008
127views more  JSW 2008»
15 years 4 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
MTA
2008
93views more  MTA 2008»
15 years 4 months ago
Digital audiobook: from passive to active pursuit
The digital home entertainment market is growing at an exceptional speed and, although limited to passive listeners, audiobook applications are growing at an annual rate of nearly ...
Marco Furini
147
Voted
NETWORK
2006
96views more  NETWORK 2006»
15 years 4 months ago
A wireless biosensor network using autonomously controlled animals
Recent research shows that animals can be guided remotely by stimulating regions of the brain. Therefore, it is possible to set up an animal wireless sensor network for search and...
Yihan Li, Shivendra S. Panwar, Shiwen Mao
SIGOPS
2008
156views more  SIGOPS 2008»
15 years 4 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan