Sciweavers

688 search results - page 96 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
105
Voted
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 8 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
118
Voted
DRM
2003
Springer
15 years 7 months ago
The Darknet and the Future of Content Protection
We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protoc...
Peter Biddle, Paul England, Marcus Peinado, Bryan ...
128
Voted
SEM
2004
Springer
15 years 8 months ago
Service Discovery Protocol Interoperability in the Mobile Environment
The emergence of portable computers and wireless technologies has introduced new challenges for middleware. Mobility brings new requirements and is becoming a key characteristic. M...
Yérom-David Bromberg, Valérie Issarn...
108
Voted
ADHOCNOW
2007
Springer
15 years 8 months ago
Topology Control and Geographic Routing in Realistic Wireless Networks
We present a distributed topology control protocol that runs on a d-QUDG for d ≥ 1/ √ 2, and computes a sparse, constant-spanner, both in Euclidean distance and in hop distance...
Kevin M. Lillis, Sriram V. Pemmaraju, Imran A. Pir...
114
Voted
SENSYS
2006
ACM
15 years 8 months ago
Supporting concurrent applications in wireless sensor networks
It is vital to support concurrent applications sharing a wireless sensor network in order to reduce the deployment and administrative costs, thus increasing the usability and efï¬...
Yang Yu, Loren J. Rittle, Vartika Bhandari, Jason ...