Sciweavers

4612 search results - page 832 / 923
» More Communications
Sort
View
EUROSYS
2008
ACM
14 years 6 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
EUROSYS
2010
ACM
14 years 3 months ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen
MOBIHOC
2007
ACM
14 years 8 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
ESA
2003
Springer
99views Algorithms» more  ESA 2003»
14 years 2 months ago
Adversary Immune Leader Election in ad hoc Radio Networks
Abstract. Recently, efficient leader election algorithms for ad hoc radio networks with low time complexity and energy cost have been designed even for the no-collision detection,...
Miroslaw Kutylowski, Wojciech Rutkowski
TCOM
2010
156views more  TCOM 2010»
13 years 3 months ago
Joint Carrier Frequency Offset and Channel Estimation for Uplink MIMO-OFDMA Systems Using Parallel Schmidt Rao-Blackwellized Par
Joint carrier frequency offset (CFO) and channel estimation for uplink MIMO-OFDMA systems over time-varying channels is investigated. To cope with the prohibitive computational co...
Kyeong Jin Kim, Man-On Pun, Ronald A. Iltis