Sciweavers

4189 search results - page 817 / 838
» On the Security of Wireless Sensor Networks
Sort
View
DSN
2006
IEEE
14 years 1 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
DFN
2003
13 years 9 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
MOBICOM
2004
ACM
14 years 1 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
MHCI
2009
Springer
14 years 2 months ago
Using semantic descriptions for adaptive mobile games UIs
Mobile devices became powerful recently and wireless Internet access is becoming standard. One important class of networked, mobile applications are location based games, making e...
Pascal Bihler, Holger Mügge, Mark Schmatz, Ar...
DATE
2008
IEEE
123views Hardware» more  DATE 2008»
14 years 2 months ago
Test Strategies for Low Power Devices
Ultra low-power devices are being developed for embedded applications in bio-medical electronics, wireless sensor networks, environment monitoring and protection, etc. The testing...
C. P. Ravikumar, M. Hirech, X. Wen