Sciweavers

2421 search results - page 396 / 485
» Message from the Editor-in-Chief
Sort
View
JNW
2008
126views more  JNW 2008»
13 years 10 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
JSAC
2008
167views more  JSAC 2008»
13 years 10 months ago
DTN: an architectural retrospective
We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a foc...
Kevin R. Fall, Stephen Farrell
JMLR
2006
147views more  JMLR 2006»
13 years 10 months ago
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images
In recent years anti-spam filters have become necessary tools for Internet service providers to face up to the continuously growing spam phenomenon. Current server-side anti-spam ...
Giorgio Fumera, Ignazio Pillai, Fabio Roli
ENTCS
2007
131views more  ENTCS 2007»
13 years 10 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
JPDC
2006
106views more  JPDC 2006»
13 years 10 months ago
Performance characteristics of the multi-zone NAS parallel benchmarks
We describe a new suite of computational benchmarks that models applications featuring multiple levels of parallelism. Such parallelism is often available in realistic flow comput...
Haoqiang Jin, Rob F. Van der Wijngaart