Sciweavers

8658 search results - page 1600 / 1732
» Models of Command and Control
Sort
View
JOC
2011
104views more  JOC 2011»
12 years 11 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
SAC
2011
ACM
12 years 10 months ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider
CEAS
2011
Springer
12 years 8 months ago
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems
Web mail providers rely on users to “vote” to quickly and collaboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections o...
Anirudh Ramachandran, Anirban Dasgupta, Nick Feams...
COMSUR
2011
198views Hardware» more  COMSUR 2011»
12 years 7 months ago
Optical Layer Monitoring Schemes for Fast Link Failure Localization in All-Optical Networks
—Optical layer monitoring and fault localization serves as a critical functional module in the control and management of optical networks. An efficient monitoring scheme aims at ...
Bin Wu, Pin-Han Ho, Kwan Lawrence Yeung, Já...
DSN
2011
IEEE
12 years 7 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
« Prev « First page 1600 / 1732 Last » Next »