Sciweavers

2699 search results - page 385 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
MSWIM
2004
ACM
14 years 3 months ago
Consistency challenges of service discovery in mobile ad hoc networks
Emerging “urban” ad hoc networks resulting from a large number of individual WLAN users challenge the way users could explore and interact with their physical surroundings. Ro...
Christian Frank, Holger Karl
INFOCOM
2007
IEEE
14 years 4 months ago
Realistic Sensing Area Modeling
—Despite the well-known fact that sensing patterns in reality are highly irregular, researchers continue to develop protocols with simplifying assumptions about the sensing. For ...
Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim
WCW
2004
Springer
14 years 3 months ago
Towards Informed Web Content Delivery
Abstract. A wide range of techniques have been proposed, implemented, and even standardized for improving the performance of Web content delivery. However, previous work has found ...
Leeann Bent, Michael Rabinovich, Geoffrey M. Voelk...
TMI
2008
88views more  TMI 2008»
13 years 10 months ago
Adaptive SPECT
Abstract--Adaptive imaging systems alter their dataacquisition configuration or protocol in response to the image information received. An adaptive pinhole SPECT system might acqui...
Harrison H. Barrett, L. R. Furenlid, M. Freed, J. ...
ACSAC
2009
IEEE
14 years 5 months ago
FPValidator: Validating Type Equivalence of Function Pointers on the Fly
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Hua Wang, Yao Guo, Xiangqun Chen