Sciweavers

1119 search results - page 179 / 224
» On the Invariance of Ant System
Sort
View
AINA
2007
IEEE
14 years 4 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
ICC
2007
IEEE
117views Communications» more  ICC 2007»
14 years 4 months ago
ESPRIT-Based Directional MAC Protocol for Mobile Ad Hoc Networks
— The use of directional antennas in mobile ad hoc networks has shown to offer large potential throughput gains relative to omnidirectional antennas. When used in ad hoc networks...
Kun Liu, Walaa Hamouda, Amr Youssef
SOCA
2007
IEEE
14 years 4 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
ICICIC
2006
IEEE
14 years 3 months ago
Fingerprint Identification Based on Frequency Texture Analysis
Nowadays the AFIS (Automatic fingerprint Identification system) plays more and more important roles in various applications such as access control, ATM card verification and crimi...
Juncao Li, Yong Zhang, Wenhai Kong, Xiamu Niu
SP
2005
IEEE
100views Security Privacy» more  SP 2005»
14 years 3 months ago
Polygraph: Automatically Generating Signatures for Polymorphic Worms
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt....
James Newsome, Brad Karp, Dawn Xiaodong Song